0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,566)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback): Jason Deckard Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback)
Jason Deckard
R839 Discovery Miles 8 390 Ships in 10 - 15 working days

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows.
*None of the current-best selling software security books focus exclusively on buffer overflows.
*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

Enabling Blockchain Technology for Secure Networking and Communications (Hardcover): Adel Ben Mnaouer, Lamia Chaari Fourati Enabling Blockchain Technology for Secure Networking and Communications (Hardcover)
Adel Ben Mnaouer, Lamia Chaari Fourati
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.

Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover): Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover)
R4,731 Discovery Miles 47 310 Ships in 18 - 22 working days

Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.

Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover):... Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover)
Emmanuel Udoh, Frank Zhigang Wang
R6,632 Discovery Miles 66 320 Ships in 18 - 22 working days

Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.

Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover): Luisa Dall'acqua, Irene Maria... Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover)
Luisa Dall'acqua, Irene Maria Gironacci
R5,353 Discovery Miles 53 530 Ships in 18 - 22 working days

The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.

Multimedia Transcoding in Mobile and Wireless Networks (Hardcover): Ashraf M. a. Ahmad, Ismail Khalil Ibrahim Multimedia Transcoding in Mobile and Wireless Networks (Hardcover)
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim
R4,984 Discovery Miles 49 840 Ships in 18 - 22 working days

In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.

Internet of Things - Technology, Applications and Standardization (Hardcover): Jaydip Sen Internet of Things - Technology, Applications and Standardization (Hardcover)
Jaydip Sen
R3,061 Discovery Miles 30 610 Ships in 18 - 22 working days
China's e-Science Blue Book 2018 (Hardcover, 1st ed. 2020): Chinese Academy of Sciences, Cyberspace Administration Of... China's e-Science Blue Book 2018 (Hardcover, 1st ed. 2020)
Chinese Academy of Sciences, Cyberspace Administration Of China, Ministry of Education, Ministry Of Science And Technology, Chinese Academy of Social Sciences, …
R2,710 Discovery Miles 27 100 Ships in 18 - 22 working days

This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R1,786 Discovery Miles 17 860 Ships in 10 - 15 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Handbook of Communications Security (Hardcover): F. Garzia Handbook of Communications Security (Hardcover)
F. Garzia
R8,176 Discovery Miles 81 760 Ships in 10 - 15 working days

Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. Giving the reader information relating to all aspects of communications security, this book begins at the base ideas and builds to reach the most advanced and updated concepts. The comprehensive coverage makes the book a one-stop reference for integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.

Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover): Luis Miguel Borges,... Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover)
Luis Miguel Borges, Norberto Barroca, Periklis Chatzimisios, Fernando Jose Velez
R2,861 Discovery Miles 28 610 Ships in 10 - 15 working days

Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.

Amazon Relational Database Service User Guide (Hardcover): Documentation Team Amazon Relational Database Service User Guide (Hardcover)
Documentation Team
R2,956 Discovery Miles 29 560 Ships in 18 - 22 working days
Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Configuring NetScreen Firewalls (Paperback): Rob Cameron Configuring NetScreen Firewalls (Paperback)
Rob Cameron
R831 Discovery Miles 8 310 Ships in 10 - 15 working days

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security Manager. This book offers novice users a complete opportunity to learn the NetScreen firewall appliance. Advanced users will find it a rich technical resource.
* NetScreen is the #2 best-selling firewall appliance in the world (behind only Cisco PIX) and there are no competing books.
* Covers the materials found on the NetScreen NCSA 5.0 exam.
* Syngress firewall books are consistent best-sellers with market-leading books on ISA Server, Cisco PIX, and Check Point Next Generation.

Cloud Computing & Virtualization (Hardcover, St ed.): R Rajeswara Rao, V Subba Ramaiah Cloud Computing & Virtualization (Hardcover, St ed.)
R Rajeswara Rao, V Subba Ramaiah
R1,736 R1,494 Discovery Miles 14 940 Save R242 (14%) Ships in 18 - 22 working days
Stealing the Network - How to Own a Continent (Loose-leaf): Ryan Russell, Joe Grand, Tom Craig Stealing the Network - How to Own a Continent (Loose-leaf)
Ryan Russell, Joe Grand, Tom Craig
R1,088 R883 Discovery Miles 8 830 Save R205 (19%) Ships in 10 - 15 working days

This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world

Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 18 - 22 working days
WiFi, WiMAX, and LTE Multi-hop Mesh Networks - Basic Communication Protocols and Application Areas (Hardcover): HY Wei WiFi, WiMAX, and LTE Multi-hop Mesh Networks - Basic Communication Protocols and Application Areas (Hardcover)
HY Wei
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

"Wifi, WiMAX, and Cellular Multihop Network"s presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in learning more about WiFi and WiMAX multihop relay networks.

Knowledge Management Innovations for Interdisciplinary Education - Organizational Applications (Hardcover, New): Sheryl... Knowledge Management Innovations for Interdisciplinary Education - Organizational Applications (Hardcover, New)
Sheryl Beverley Buckley, Maria Jakovljevic
R4,517 Discovery Miles 45 170 Ships in 18 - 22 working days

Knowledge management innovations provide essential pathways through which teachers, researchers, students, and knowledge management professionals who are interested in understanding and applying knowledge management theory and practice can transfer their insights and experiences into both organizational and educational settings. Knowledge Management Innovations for Interdisciplinary Education: Organizational Applications is a detailed resource on knowledge management and innovations that has been written and edited to provide flexibility and in-depth knowledge management innovations, strategies, and practices. The combination of a primary emphasis on theory and practice with applications to interdisciplinary education, as well as organizational environments, makes this book unique among the burgeoning literature on knowledge management.

AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover): Documentation Team AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover)
Documentation Team
R2,376 R1,953 Discovery Miles 19 530 Save R423 (18%) Ships in 18 - 22 working days
Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019): Amit Kumar Singh, Anand... Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019)
Amit Kumar Singh, Anand Mohan
R6,633 Discovery Miles 66 330 Ships in 10 - 15 working days

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

HP NonStop Server Security - A Practical Handbook (Paperback): XYPRO Technology Corp HP NonStop Server Security - A Practical Handbook (Paperback)
XYPRO Technology Corp
R2,760 R2,599 Discovery Miles 25 990 Save R161 (6%) Ships in 10 - 15 working days

Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook is a source for critical information to NonStop professionals and NonStop security administrators in particular. However, it is written in such a way as to also be extremely useful to readers new to the NonStop platform and to information security.
This handbook familiarizes auditors and those responsible for security configuration and monitoring with the aspects of the HP NonStop server operating system that make the NonStop Server unique, the security risks these aspects create, and the best ways to mitigate these risks.
.Addresses the lack of security standards for the NonStop server
.Provides information robust enough to train more security-knowledgeable staff
.The ideal accompaniment to any new HP NonStop system"

Comparison-shopping Services and Agent Designs (Hardcover): Wang Yun Comparison-shopping Services and Agent Designs (Hardcover)
Wang Yun
R4,953 Discovery Miles 49 530 Ships in 18 - 22 working days

Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.

Voice, Video, and Data Network Convergence - Architecture and Design, From VoIP to Wireless (Paperback): Juanita Ellis, Joy... Voice, Video, and Data Network Convergence - Architecture and Design, From VoIP to Wireless (Paperback)
Juanita Ellis, Joy Rahman, Charles Pursell
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days

*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
*Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions
A recent survey of 500 U.S. companies with multiple locations found that 81% are planning to implement IP Telephony on their local area networks (LANs) in 2003, and two-thirds are looking at convergence for their wide area networks (WANs) as well. This includes voice, video and data over hard line and wireless networks.
Today, new standards and technologies are being developed to support convergence and voice over IP (VoIP) and Video over IP and wireless. Because convergence covers the voice and data world, it will be critical to understand all of these environments.
This book provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.
*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
*Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions

An Architecture for Fast and General Data Processing on Large Clusters (Hardcover): Matei Zaharia An Architecture for Fast and General Data Processing on Large Clusters (Hardcover)
Matei Zaharia
R1,838 Discovery Miles 18 380 Ships in 18 - 22 working days

The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,276 Discovery Miles 92 760
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710

 

Partners