![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
A new product can be easy or difficult to use, it can be efficient or cumbersome, engaging or dispiriting, it can support the way we work and think - or not. What options are available for systematically addressing such parameters and provide users with an appropriate functionality, usability and experience? In the last decades, several fields have evolved that encompass a user-centred approach to create better products for the people who use them. This book provides a comprehensible introduction to the subject. It is aimed first and foremost at people involved in software and product development - product managers, project managers, consultants and analysts, who face the major challenge of developing highly useful and usable products. Topics include: The most important user-centred techniques and their alignment in the development process Planning examples of user-centred activities for projects User-oriented approaches for organisations Real-life case studies Checklists, tips and a lot of background information provide help for practitioners
This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: * Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures * Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies * Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets
The end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.
The book is focused on defense mechanisms as theoretical constructs
as well as the possibilities of their empirical registration by
different methods, and the application of these constructs in
different fields of psychology with special regard to concurrent
and predictive validity. It is argued that defense mechanisms are
in many ways to be seen as integrative constructs, not necessarily
restricted to psychoanalytic theory and that the potential fields
of their application have a wide ranging scope, comprising many
fields of psychology. Consequently empirical studies are presented
from the fields of clinical and personality psychology,
psychotherapy research and psychosomatic phenomena and diseases.
Methodological questions have a heavy weight in most of these
studies.
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications. It presents a step-by-step methodology to understand and exploit mobility data: collecting and cleansing data, storage in Moving Object Database (MOD) engines, indexing, processing, analyzing and mining mobility data. Emerging issues, such as semantic and privacy-aware querying and mining as well as distributed data processing, are also covered. Theoretical presentation is smoothly interchanged with hands-on exercises and case studies involving an actual MOD engine. The authors are established experts who address both theoretical and practical dimensions of the field but also present valuable prototype software. The background context, clear explanations and sample exercises make this an ideal textbook for graduate students studying database management, data mining and geographic information systems.
This proceedings volume highlights a selection of papers presented at the 7th International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam, during March 19-23, 2018. The conference has been organized by the Institute of Mathematics of the Vietnam Academy of Science and Technology, the Interdisciplinary Center for Scientific Computing (IWR) of Heidelberg University and the Vietnam Institute for Advanced Study in Mathematics. The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered include numerical simulation, methods for optimization and control, machine learning, parallel computing and software development, as well as the applications of scientific computing in mechanical engineering, airspace engineering, environmental physics, decision making, hydrogeology, material science and electric circuits.
Healthcare organizations are constantly designing effective systems aiming to help achieve customer satisfaction. Web-based and mobile-based technologies are two forms of information technologies that healthcare executives are increasingly looking to merge as an opportunity to develop such systems. ""Web Mobile-Based Applications for Healthcare Management"" addresses the difficult task of managing admissions and waiting lists while ensuring a quick and convincing response to unanticipated changes of the clinical needs. ""Web Mobile-Based Applications for Healthcare Management"" tackles the limitations of traditional systems, and takes into consideration the dynamic nature of clinical needs, scarce resources, alternative strategies, and customer satisfaction in an environment that often imposes unexpected deviation from planned activities.
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.""The Handbook of Research on Information Security and Assurance"" offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with technology.
This book contains original research chapters related to the interdisciplinary field of complex networks spanning biological and environmental networks, social, technological, and economic networks. Many natural phenomena can be modeled as networks where nodes are the primitive compounds and links represent their interactions, similarities, or distances of sorts. Complex networks have an enormous impact on research in various fields like biology, social sciences, engineering, and cyber-security to name a few. The topology of a network often encompasses important information on the functionality and dynamics of the system or the phenomenon it represents. Network science is an emerging interdisciplinary discipline that provides tools and insights to researchers in a variety of domains. NetSci-X is the central winter conference within the field and brings together leading researchers and innovators to connect, meet, and establish interdisciplinary channels for collaboration. It is the largest and best known event in the area of network science. This text demonstrates how ideas formulated by authors with different backgrounds are transformed into models, methods, and algorithms that are used to study complex systems across different domains and will appeal to researchers and students within in the field.
"Network Science and Cybersecurity" introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers. This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .
This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms. The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling. Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social networks, business intelligence and forming collaboration schemes. Given the subject area, this book is aimed at a broad audience of researchers and practitioners. Owing to the nature of the material being covered and a way it is organized, the volume will appeal to the well-established communities including those active in various disciplines in which social networks, their analysis and optimization are of genuine relevance. Those involved in operations research, management, various branches of engineering, and economics will benefit from the exposure to the subject matter.
Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both physical and cyber components requires tools allowing analyzing and modeling both the discrete and continuous dynamics. Therefore, many CPS can be modeled as hybrid dynamic systems in order to take into account both discrete and continuous behaviors as well as the interactions between them. Guaranteeing the security and safety of CPS is a challenging task because of the inherent interconnected and heterogeneous combination of behaviors (cyber/physical, discrete/continuous) in these systems. This book presents recent and advanced approaches and tech-niques that address the complex problem of analyzing the diagnosability property of cyber physical systems and ensuring their security and safety against faults and attacks. The CPS are modeled as hybrid dynamic systems using different model-based and data-driven approaches in different application domains (electric transmission networks, wireless communication networks, intrusions in industrial control systems, intrusions in production systems, wind farms etc.). These approaches handle the problem of ensuring the security of CPS in presence of attacks and verifying their diagnosability in presence of different kinds of uncertainty (uncertainty related to the event occurrences, to their order of occurrence, to their value etc.).
"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if
you're preparing for an IT audit, participating in an IT audit or
responding to an IT audit.
"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments. This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture. If you're a network designer or architect, a technical sales
professional, or if you're pursuing technical certifications, you
will benefit from "Network Convergence"'s fundamental information
on this rapidly evolving technology.
"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures companion website http: //secvoip.comgiving readers access to
the most up-to-date information on UC attacks. Provides key information for hackers and pen testers on the most current Unified Communications implementations. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "
With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.
This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. " FISMA Compliance Handbook Second Edition, "also includes all-new
coverage of federal cloud computing compliance from author Laura
Taylor, the federal government s technical lead for FedRAMP, the
government program used to assess and authorize cloud products and
services. Includes coverage for both corporate and government IT managers Learn how to prepare for, perform, and document FISMA compliance projects This book is used by various colleges and universities in information security and MBA curriculums. "
Focusing on connection technologies used for both single-mode and multimode fibers, this book explains multifiber connections such as mass-fusion splice and multifiber connectors. Information on fluoride glass fibers, doped fibers (EDFA), and components is included. |
![]() ![]() You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,539
Discovery Miles 15 390
|