![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. Discusses measurement and modeling of the energy consumption method Includes methods for energy consumption reduction in diverse computing environments Features a variety of case studies and examples of energy reduction and assessment Timely and important, Large-Scale Distributed Systems and Energy Efficiency is an invaluable resource for ways of increasing the energy efficiency of computing systems and networks while simultaneously reducing the carbon footprint.
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.
This thesis focuses on the design and use of software defined networking (SDN) in residential Internet service providers (ISPs), as well as innovative operational models that can be incorporated in broadband ecosystems. Though SDN addresses the challenges for bundled best-effort service provided by broadband operators for users, it does not distinguish between the different types of applications (video streaming, web-browsing, and large file transfers), nor does it cater to the varying needs of different household devices (entertainment tablets, work laptops, or connected appliances). This is a problem for end-users, who want to differentiate between applications and devices; for content providers (CPs), who want to exercise control over streams of high monetary value; and for Internet service providers (ISPs), who have to accommodate growing traffic volumes without additional revenues. This book develops a series of solution techniques that use SDN to find an optimal balance between the competing requirements of end-users, ISPs, and CPs. In addition to the design and discussions of various architectures, it provides technical details on real-world system implementations and prototypes. As such, it offers a valuable resource for researchers, network architects, network strategists, developers, and all other readers seeking to learn more about the practical value of SDN in future ISP networks.
Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how the IT systems are established and maintained. The design, development, management, utilization, and evaluation of these IT systems will be necessary for the university to operate successfully. IT Issues in Higher Education: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the integration and management of information technology in higher education with a focus on issues of security, data management, student access to information, and staff competency. This publication explores present-day educational environments as well as educators' methods of applying technology to student success and highlights topics that include personal devices and institutional culture. It is ideally designed for academic professionals, lecturers, students, professors, IT experts, instructional designers, curriculum developers, administrators, higher education faculty, researchers, and policymakers.
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.
Data Networks builds on the foundation laid in Kenyon's first book,
High-Performance Data Network Design, with expanded coverage of
routing, security, multicasting, and advanced design topics such as
performance optimization and fault tolerance. Kenyon provides
strategies for overcoming some of the most challenging problems in
network design and management. He provides clear, specific
solutions for day-to-day problems facing network designers and IT
managers. In this book, you will find optimization advice from an
experienced practitioner that you can put to work in your own
system.
The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.
Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds.
Network-dependent companies are excited by the benefits promised
by the virtual private network, including lower costs, greater
flexibility, and improvements in connectivity. But they also have
questions: What benefits are real? How can they be measured? What
are the expenses and the dangers? Virtual Private Networks: Making the Right Connection is an
intelligent introduction written especially for business and IT
professionals who want a realistic assessment of what a VPN can
provide for their organizations. Covering advantages and risks,
this book expands your understanding of what you can do with a VPN,
while detailing all that implementing it will demand of you. With
its help, you'll find your way through VPN hype to the answers you
need to make sound decisions.
"By 2008, some 2 billion people will be using mobile phones and devices, in many cases to access advanced data services. Against this backdrop, the need for efficient and effective network design will be critical to the success of increasingly complex mobile networks." "Simon Beresford-Wylie (SVP, Nokia Networks)" With the complexity of the cellular networks increasing day by day, a deeper understanding of the design and performance of end-to-end cellular networks is required. Moreover, all the types of networks from 2G-2.5G-3G seem to co-exist. "Fundamentals of" "Cellular Network Planning and Optimisation" covers end-to-end network planning and optimisation aspects from second generation GSM to third generation WCDMA networks including GPRS and EDGE networks. All the sub-systems of the network i.e. radio network, transmission network and core network have been covered with focus on both practical and theoretical issues. By bringing all these concepts under one cover, this book becomes essential reading for the network design engineers working either with cellular service vendors or operators, experts/scientists working on end-to-end issues and undergraduate/post-graduate students. Key Highlights: Distinctly divided into four parts: 2G (GSM), 2.5G (GPRS & EDGE), 3G (WCDMA) and introduction to 4G (OFDM, ALL-IP, WLAN Overview) respectivelyEach part focuses on the radio, transmission and core networks.Concentrates on cellular network planning process and explains the underlying principles behind the planning and optimizing of the cellular networks. The text will serve as a handbook for anyone engaged in the study, design, deployment and business of cellular networks.
This book proposes that usage-based charging schemes are essential
to generate the incentives necessary for efficient operation of
multiservice networks. The rapid development of network technology
is enabling sophisticated new services and applications which
demand new charging models. The same technology provides the means
to operate the right charging schemes.Some of the work done in the
European collaborative project CA$hMAN (Charging and
Accounting Schemes in Multiservice ATM Networks). This project
combined performance and economic models of network resource usage
and cutomer utility to construct simple but effective charging
schemes which were implemented and trialled in an advanced
management platform.
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.
This book de-mystifies the technology behind video conferencing and
provides single users and small enterprises with the information
they need to deploy video conferencing efficiently and cost
effectively.
IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.
Introduction: Historical Perspective. Definitions and Dependencies. Prerequisite Knowledge Areas: User Capabilities and Limitations. Computer Applications and Tasks. Computer Capabilities and Limitations. Interaction Characteristics and Options. Representation Models and Methods. Supportive Tools and Techniques. Design and Development: Design Terms and Decision Constructs. Design Approaches and Methods. Design Objects, Modules, and Models. Special-Purpose Designs: Network-Oriented Design. Adaptive Design. Index.
Sustaining a competitive edge in today's business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models Business Transformation and Sustainability through Cloud System Implementation presents novel computing technologies designed for use in business and corporate environments, enabling managers and associates to make the most of the technologies at their disposal. This premier reference work seeks to alert firm management professionals and researchers to the potential risks and benefits associated with emerging technologies and guide firms on the proper selection, maintenance, and use of Web-based computing systems.
This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants. It also offers a brief overview of the corresponding techniques at research and materials testing reactors. The book combines detailed descriptions of the theoretical background and fundamental underlying principles as well as the practical applications of core surveillance. It not only provides numerous industrial examples to illustrate how complex computerized systems are able to support the safe operation of nuclear reactors, but also outlines some new application areas that were made possible only by state-of-the-art computing resources. Thanks to its practical approach, it serves as a valuable and practical reference book for readers interested in the surveillance of nuclear reactors, ranging from undergraduate and postgraduate students to researchers and experts working at research reactors and nuclear power plants, as well as at nuclear regulatory authorities.
* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.
This proceedings volume highlights a selection of papers presented at the Sixth International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam on March 16-20, 2015. The conference was jointly organized by the Heidelberg Institute of Theoretical Studies (HITS), the Institute of Mathematics of the Vietnam Academy of Science and Technology (VAST), the Interdisciplinary Center for Scientific Computing (IWR) at Heidelberg University, and the Vietnam Institute for Advanced Study in Mathematics, Ministry of Education The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered numerical simulation, methods for optimization and control, parallel computing, and software development, as well as the applications of scientific computing in physics, mechanics, biomechanics and robotics, material science, hydrology, biotechnology, medicine, transport, scheduling, and industry.
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.
This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys informationin an understandable way, meaning managers won't need to rely solely on the IT people in their own company--who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.
|
You may like...
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
|