![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.
Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization's identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.
This book provides extensive insight into the possibilities and challenges of XML in building new information management solutions in networked organizations. After a brief introduction to Web communication features and XML fundamentals, the book examines the benefits of adopting XML and illustrates various types of XML use: XML in document management; XML for data-centric and multimedia components; XML as a format for metadata, including metadata for the Semantic Web; and XML in support of data interchange between software applications and among organizations. The challenges of adopting XML in large-scale information management are also discussed. In addition, applications across a broad spectrum are examined and numerous case studies pertaining to the adoption of XML are presented. The book is particularly suitable for courses offered in Information Studies, Information Systems, or Information Technology. It also serves as an excellent practical guide for professionals in information management and provides important support material for courses in Computer Science and in Business.
With a variety of media types, multimedia data engineering has emerged as a new opportunity to create techniques and tools that empower the development of the next generation of multimedia databases and information systems. Multimedia Data Engineering Applications and Processing presents different aspects of multimedia data engineering and management research. This collection of recent theories, technologies and algorithms brings together a detailed understanding of multimedia engineering and its applications. This reference source will be of essential use for researchers, scientists, professionals and software engineers in the field of multimedia.
Private cloud computing enables you to consolidate diverse
enterprise systems into one that is cloud-based and can be accessed
by end-users seamlessly, regardless of their location or changes in
overall demand. Expert authors Steve Smoot and Nam K. Tan distill
their years of networking experience to describe how to build
enterprise networks to create a private cloud. With their
techniques you'll create cost-saving designs and increase the
flexibility of your enterprise, while maintaining the security and
control of an internal network. "Private Cloud Computing "offers a
complete cloud architecture for enterprise networking by
synthesizing WAN optimization, next-generation data centers, and
virtualization in a network-friendly way, tying them together into
a complete solution that can be progressively migrated to as time
and resources permit.
In the last decade we have seen the emergence of a new inter-disciplinary field concentrating on the understanding large networks which are dynamic, large, open, and have a structure that borders order and randomness. The field of Complex Networks has helped us better understand many complex phenomena such as spread of decease, protein interaction, social relationships, to name but a few. The field of Complex Networks has received a major boost caused by the widespread availability of huge network data resources in the last years. One of the most surprising findings is that real networks behave very distinct from traditional assumptions of network theory. Traditionally, real networks were supposed to have a majority of nodes of about the same number of connections around an average. This is typically modeled by random graphs. But modern network research could show that the majority of nodes of real networks is very low connected, and, by contrast, there exists some nodes of very extreme connectivity (hubs). The current theories coupled with the availability of data makes the field of Complex Networks (sometimes called Network Sciences) one of the most promising interdisciplinary disciplines of today. This sample of works in this book gives as a taste of what is in the horizon such controlling the dynamics of a network and in the network, using social interactions to improve urban planning, ranking in music, and the understanding knowledge transfer in influence networks."
Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work by utilizing a software tool that simulates the functions within a network. The tool provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance. "The Network Simulation Experiments Manual" takes this
instructional tool a step further and provides detailed experiments
on core networking topologies for use in this simulation
environment. Various scenarios are presented within each topology:
Review questions, suggested readings, a lab report, and exercises
accompanying each assignment. The manual also comes with directions
for downloading the free and easy-to-install OPNET IT Guru Academic
Edition software. This software provides a virtual environment for
modeling, analyzing, and predicting the performance of IT
infrastructures, including applications, servers, and networking
technologies. Prepared by Professor Emad Aboelela of the Taibah
University, Saudi Arabia, the experiments in the manual are closely
tied to the organization of "Computer Networks: A Systems Approach,
Fifth Edition" and, when used together, serve as a complete tool
for understanding how and why computer networks function as they
do.
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.
This book provides a collection of concepts, algorithms, and techniques that effectively harness the power of Spatial Network Big Data. Reading this book is a first step towards understanding the immense challenges and novel applications of SNBD database systems. This book explores these challenges via investigating scalable graph-based query processing strategies and I/O efficient storage and access methods. This book will be of benefit to academics, researchers, engineers with a particular interest in network database models, network query processing, and physical storage models.
Cloud computing has proven to be a successful paradigm of service-oriented computing, and has revolutionized the way computing infrastructures are abstracted and used. By means of cloud computing technology, massive data can be managed effectively and efficiently to support various aspects of problem solving and decision making. Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud. Providing timely, research-based information relating to data storage, sharing, extraction, and indexing in cloud systems, this publication is an ideal reference source for graduate students, IT specialists, researchers, and professionals working in the areas of data and knowledge engineering.
A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. "Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.
The volume "The UNESCO Memory of the World Programme: Key Aspects and Recent Developments" responds to the growing interest in the scientific study of the Memory of the World Programme (MoW) and its core concept of documentary heritage, which has received little attention from scholarship so far. This sixth publication in the Heritage Studies Series provides a first collection of differing approaches (including reflected reports, essays, research contributions, and theoretical reflections) for the study of the MoW Programme, offering a basis for follow-up activities. The volume, edited by Ray Edmondson, Lothar Jordan and Anca Claudia Prodan, brings together 21 scholars from around the globe to present aspects deemed crucial for understanding MoW, its development, relevance and potential. The aim is to encourage academic research on MoW and to enhance the understanding of its potential and place within Heritage Studies and beyond.
The growth, scale, and prominence of video applications over the
years have placed emphasis on the most scalable and efficient way
to deliver multi-play content (voice, video and data) to the end
user. Multicast is the most effective and efficient carrier of
video applications from a network standpoint. Financial
organizations deploy large-scale multicast infrastructures to
enable trading and e-commerce. The introduction of 4G and beyond
makes this technology even more indispensible since mobile
operators need an efficient mechanism to deliver repetitive content
to many a handset, and multicast is the answer. Thisis the first
book to distill information on this topic from disparate sources.
It is written by one of the early implementers, andis the go-to
referencefor deploying the Next Generation model.Thisbook proves
areal benefit to networking professionals from service providers,
enterprises, the vendor community, and anyone elsewho wants to
understand this fast emerging and popular scheme of deployment from
a vendor-neutral standpoint. Provides the background necessary to understand current generation multi-play applications and their service requirements Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.
This book presents emerging trends in the evolution of service-oriented and enterprise architectures. New architectures and methods of both business and IT are integrating services to support mobility systems, Internet of Things, Ubiquitous Computing, collaborative and adaptive business processes, Big Data, and Cloud ecosystems. They inspire current and future digital strategies and create new opportunities for the digital transformation of next digital products and services. Services Oriented Architectures (SOA) and Enterprise Architectures (EA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implementing various standards, like Web Services, REST, and Microservices. Managing the adaptation and evolution of such systems presents a great challenge. Service-Oriented Architecture enables flexibility through loose coupling, both between the services themselves and between the IT organizations that manage them. Enterprises evolve continuously by transforming and extending their services, processes and information systems. Enterprise Architectures provide a holistic blueprint to help define the structure and operation of an organization with the goal of determining how an organization can most effectively achieve its objectives. The book proposes several approaches to address the challenges of the service-oriented evolution of digital enterprise and software architectures.
Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.
This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.
Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm.
No nation - especially the United States - has a coherent
technical and architectural strategy for preventing cyber attack
from crippling essential critical infrastructure services. This
book initiates an intelligent national (and international) dialogue
amongst the general technical community around proper methods for
reducing national risk. This includes controversial themes such as
the deliberate use of deception to trap intruders. It also serves
as an attractive framework for a new national strategy for cyber
security, something that several Presidential administrations have
failed in attempting to create. In addition, nations other than the
US might choose to adopt the framework as well Amoroso offers a
technical, architectural, and management solution to the problem of
protecting national infrastructure. This includes practical and
empirically-based guidance for security engineers, network
operators, software designers, technology managers, application
developers, and even those who simply use computing technology in
their work or home. Each principle is presented as a separate
security strategy, along with pages of compelling examples that
demonstrate use of the principle. A specific set of criteria
requirements allows any organization, such as a government agency,
to integrate the principles into their local environment. This book
takes the national debate on protecting critical infrastructure in
an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.
The governance of global communications is consolidating as a field where innovative political practices of multi-actor collaboration are being experimented. Within this broad political landscape, the Internet governance domain is emerging as one of the most relevant areas where institutional and non-institutional actors are converging in order to reform collectively governance mechanisms that will determine the future developments of the Internet technology. This book adopts a network approach to study the progressive and collective construction of a new discourse on Internet governance fostered by the realization of the United Nations Internet Governance Forum, a new "space for multi-stakeholder policy-dialogue" (WSIS Tunis Agenda 2005, art. 72). Looking both at how semantic and social connections are created in the online and the offline discursive spaces, this book seeks to provide insights on how principles of democratic collaboration between institutional and non-institutional actors are translated into actual political dynamics; on how the global political agenda on the governance of the Internet comes to be shaped thanks to the provision of heterogeneous and sometimes opposite thematic inputs; and, finally, on how the roles of States, intergovernmental bodies, civil society entities in participatory supra-national politics are progressively being (re)defined. Starting form the Internet governance case study, this books aims at providing an alternative approach to the study of supra-national politics as well as of global communication governance processes: one that considers simultaneously contents and processes of political dynamics and examines how immaterial resources, such as information and communication, become a new field for multi-actor politics experiments, conflicts and network construction. |
You may like...
Introduction to Stochastic Programming
John R. Birge, Francois Louveaux
Hardcover
R2,556
Discovery Miles 25 560
Discrete Choice Analysis with R
Antonio Paez, Genevieve Boisjoly
Hardcover
R3,343
Discovery Miles 33 430
Service Orchestration as Organization…
Malinda Kapuruge, Jun Han, …
Paperback
R1,309
Discovery Miles 13 090
Hardware Accelerators in Data Centers
Christoforos Kachris, Babak Falsafi, …
Hardcover
R3,812
Discovery Miles 38 120
|