![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
The SANS Institute maintains a list of the "Top 10 Software
Vulnerabilities." At the current time, over half of these
vulnerabilities are exploitable by Buffer Overflow attacks, making
this class of attack one of the most common and most dangerous
weapon used by malicious attackers. This is the first book
specifically aimed at detecting, exploiting, and preventing the
most common and dangerous attacks.
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.
Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.
Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.
The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.
In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.
This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.
In designing a network device, you make dozens of decisions that
affect the speed with which it will perform sometimes for better,
but sometimes for worse. Network Algorithmics provides a complete,
coherent methodology for maximizing speed while meeting your other
design goals.
Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. Giving the reader information relating to all aspects of communications security, this book begins at the base ideas and builds to reach the most advanced and updated concepts. The comprehensive coverage makes the book a one-stop reference for integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.
Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.
Trojans, Worms, and Spyware provides practical, easy to understand,
and readily usable advice to help organizations to improve their
security and reduce the possible risks of malicious code attacks.
Despite the global downturn, information systems security remains
one of the more in-demand professions in the world today. With the
widespread use of the Internet as a business tool, more emphasis is
being placed on information security than ever before. To
successfully deal with this increase in dependence and the ever
growing threat of virus and worm attacks, Information security and
information assurance (IA) professionals need a jargon-free book
that addresses the practical aspects of meeting new security
requirements.
The first book on the market covering the #2 best-selling firewall
appliances in the world from NetScreen. This book continues
Syngress' history from ISA Server to Check Point to Cisco Pix of
being first to market with best-selling firewall books for security
professionals.
This is a book that will create enormous debate within the
technical and the counter-terrorism communities. While there will
be the inevitable criticism that the material contained in the book
could be used maliciously, the fact is that this knowledge is
already in the hands of our enemies. This book is truly designed to
inform while entertaining (and scaring) the reader, and it will
instantly be in demand by readers of "Stealing the Network: How to
Own the Box"
"Wifi, WiMAX, and Cellular Multihop Network"s presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in learning more about WiFi and WiMAX multihop relay networks.
Knowledge management innovations provide essential pathways through which teachers, researchers, students, and knowledge management professionals who are interested in understanding and applying knowledge management theory and practice can transfer their insights and experiences into both organizational and educational settings. Knowledge Management Innovations for Interdisciplinary Education: Organizational Applications is a detailed resource on knowledge management and innovations that has been written and edited to provide flexibility and in-depth knowledge management innovations, strategies, and practices. The combination of a primary emphasis on theory and practice with applications to interdisciplinary education, as well as organizational environments, makes this book unique among the burgeoning literature on knowledge management.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
Since the last publication of the Ernst and Young book on Tandem
security in the early 90's, there has been no such book on the
subject. We've taken on the task of supplying a new Handbook whose
content provides current, generic information about securing HP
NonStop servers. Emphasis is placed on explaining security risks
and best practices relevant to NonStop environments, and how to
deploy native security tools (Guardian and Safeguard). All third
party vendors who supply security solutions relevant to NonStop
servers are listed, along with contact information for each vendor.
The Handbook is a source for critical information to NonStop
professionals and NonStop security administrators in particular.
However, it is written in such a way as to also be extremely useful
to readers new to the NonStop platform and to information security.
Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.
*Covers the latest standards and those being developed in an
ever-evolving field
The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added. |
You may like...
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,276
Discovery Miles 92 760
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
|