0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (837)
  • R500+ (14,091)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Self-Aware Computing Systems (Hardcover, 1st ed. 2017): Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu Self-Aware Computing Systems (Hardcover, 1st ed. 2017)
Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu
R5,313 Discovery Miles 53 130 Ships in 10 - 15 working days

This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.

Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March... Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Jason Staggs, Sujeet Shenoi
R2,925 Discovery Miles 29 250 Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Advances in Computer Science and Ubiquitous Computing - CSA & CUTE (Hardcover, 1st ed. 2015): Doo-Soon Park, Han-Chieh Chao,... Advances in Computer Science and Ubiquitous Computing - CSA & CUTE (Hardcover, 1st ed. 2015)
Doo-Soon Park, Han-Chieh Chao, Young-Sik Jeong, James J (Jong Hyuk) Park
R4,571 Discovery Miles 45 710 Ships in 10 - 15 working days

This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.

User-Centred Engineering - Creating Products for Humans (Hardcover, 2014 ed.): Michael Richter, Markus Fluckiger User-Centred Engineering - Creating Products for Humans (Hardcover, 2014 ed.)
Michael Richter, Markus Fluckiger
R1,992 R1,891 Discovery Miles 18 910 Save R101 (5%) Ships in 12 - 19 working days

A new product can be easy or difficult to use, it can be efficient or cumbersome, engaging or dispiriting, it can support the way we work and think - or not. What options are available for systematically addressing such parameters and provide users with an appropriate functionality, usability and experience? In the last decades, several fields have evolved that encompass a user-centred approach to create better products for the people who use them. This book provides a comprehensible introduction to the subject. It is aimed first and foremost at people involved in software and product development - product managers, project managers, consultants and analysts, who face the major challenge of developing highly useful and usable products. Topics include: The most important user-centred techniques and their alignment in the development process Planning examples of user-centred activities for projects User-oriented approaches for organisations Real-life case studies Checklists, tips and a lot of background information provide help for practitioners

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover): Information Reso... Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover)
Information Reso Management Association
R10,592 Discovery Miles 105 920 Ships in 10 - 15 working days
High Performance Cloud Auditing and Applications (Hardcover, 2014 ed.): Keesook J Han, Baek-Young Choi, Sejun Song High Performance Cloud Auditing and Applications (Hardcover, 2014 ed.)
Keesook J Han, Baek-Young Choi, Sejun Song
R5,136 Discovery Miles 51 360 Ships in 12 - 19 working days

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: * Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures * Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies * Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets

Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover): Sean P. Gorman Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover)
Sean P. Gorman
R3,022 Discovery Miles 30 220 Ships in 12 - 19 working days

The end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.

Defense Mechanisms, Volume 136 - Theoretical, Research and Clinical Perspectives (Hardcover, New): Uwe Hentschel, Gudmund... Defense Mechanisms, Volume 136 - Theoretical, Research and Clinical Perspectives (Hardcover, New)
Uwe Hentschel, Gudmund SMith, Juris G. Draguns, Wolfram Ehlers
R3,374 Discovery Miles 33 740 Ships in 12 - 19 working days

The book is focused on defense mechanisms as theoretical constructs as well as the possibilities of their empirical registration by different methods, and the application of these constructs in different fields of psychology with special regard to concurrent and predictive validity. It is argued that defense mechanisms are in many ways to be seen as integrative constructs, not necessarily restricted to psychoanalytic theory and that the potential fields of their application have a wide ranging scope, comprising many fields of psychology. Consequently empirical studies are presented from the fields of clinical and personality psychology, psychotherapy research and psychosomatic phenomena and diseases. Methodological questions have a heavy weight in most of these studies.
* Provides coverage of relevant literature
* Covers different fields of application
* Attempts an integration of the contstruct of defense mechanisms into mainstream psychology
* Provides explanations of the theoretical basis of the construct of defense mechanisms

Mobility Data Management and Exploration (Hardcover, 2014 ed.): Nikos Pelekis, Yannis Theodoridis Mobility Data Management and Exploration (Hardcover, 2014 ed.)
Nikos Pelekis, Yannis Theodoridis
R2,088 Discovery Miles 20 880 Ships in 12 - 19 working days

This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications. It presents a step-by-step methodology to understand and exploit mobility data: collecting and cleansing data, storage in Moving Object Database (MOD) engines, indexing, processing, analyzing and mining mobility data. Emerging issues, such as semantic and privacy-aware querying and mining as well as distributed data processing, are also covered. Theoretical presentation is smoothly interchanged with hands-on exercises and case studies involving an actual MOD engine. The authors are established experts who address both theoretical and practical dimensions of the field but also present valuable prototype software. The background context, clear explanations and sample exercises make this an ideal textbook for graduate students studying database management, data mining and geographic information systems.

Modeling, Simulation and Optimization of Complex Processes  HPSC 2018 - Proceedings of the 7th International Conference on High... Modeling, Simulation and Optimization of Complex Processes HPSC 2018 - Proceedings of the 7th International Conference on High Performance Scientific Computing, Hanoi, Vietnam, March 19-23, 2018 (Hardcover, 1st ed. 2021)
Hans Georg Bock, Willi Jager, Ekaterina Kostina, Hoang Xuan Phu
R2,939 Discovery Miles 29 390 Ships in 10 - 15 working days

This proceedings volume highlights a selection of papers presented at the 7th International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam, during March 19-23, 2018. The conference has been organized by the Institute of Mathematics of the Vietnam Academy of Science and Technology, the Interdisciplinary Center for Scientific Computing (IWR) of Heidelberg University and the Vietnam Institute for Advanced Study in Mathematics. The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered include numerical simulation, methods for optimization and control, machine learning, parallel computing and software development, as well as the applications of scientific computing in mechanical engineering, airspace engineering, environmental physics, decision making, hydrogeology, material science and electric circuits.

Web Mobile-based Applications for Healthcare Management (Hardcover, New): Latif Al-Hakim Web Mobile-based Applications for Healthcare Management (Hardcover, New)
Latif Al-Hakim
R2,740 Discovery Miles 27 400 Ships in 10 - 15 working days

Healthcare organizations are constantly designing effective systems aiming to help achieve customer satisfaction. Web-based and mobile-based technologies are two forms of information technologies that healthcare executives are increasingly looking to merge as an opportunity to develop such systems. ""Web Mobile-Based Applications for Healthcare Management"" addresses the difficult task of managing admissions and waiting lists while ensuring a quick and convincing response to unanticipated changes of the clinical needs. ""Web Mobile-Based Applications for Healthcare Management"" tackles the limitations of traditional systems, and takes into consideration the dynamic nature of clinical needs, scarce resources, alternative strategies, and customer satisfaction in an environment that often imposes unexpected deviation from planned activities.

Handbook of Research on Information Security and Assurance (Hardcover): Jatinder N.D. Gupta (The University of Alabama in... Handbook of Research on Information Security and Assurance (Hardcover)
Jatinder N.D. Gupta (The University of Alabama in Huntsville, USA), Sushil Sharma
R7,277 Discovery Miles 72 770 Ships in 10 - 15 working days

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.""The Handbook of Research on Information Security and Assurance"" offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with technology.

3rd International Winter School and Conference on Network Science - NetSci-X 2017 (Hardcover, 1st ed. 2017): Erez Shmueli,... 3rd International Winter School and Conference on Network Science - NetSci-X 2017 (Hardcover, 1st ed. 2017)
Erez Shmueli, Baruch Barzel, Rami Puzis
R3,133 R1,882 Discovery Miles 18 820 Save R1,251 (40%) Ships in 12 - 19 working days

This book contains original research chapters related to the interdisciplinary field of complex networks spanning biological and environmental networks, social, technological, and economic networks. Many natural phenomena can be modeled as networks where nodes are the primitive compounds and links represent their interactions, similarities, or distances of sorts. Complex networks have an enormous impact on research in various fields like biology, social sciences, engineering, and cyber-security to name a few. The topology of a network often encompasses important information on the functionality and dynamics of the system or the phenomenon it represents. Network science is an emerging interdisciplinary discipline that provides tools and insights to researchers in a variety of domains. NetSci-X is the central winter conference within the field and brings together leading researchers and innovators to connect, meet, and establish interdisciplinary channels for collaboration. It is the largest and best known event in the area of network science. This text demonstrates how ideas formulated by authors with different backgrounds are transformed into models, methods, and algorithms that are used to study complex systems across different domains and will appeal to researchers and students within in the field.

Next Generation Wireless LAN (Hardcover): Timothy Kolaya Next Generation Wireless LAN (Hardcover)
Timothy Kolaya
R1,610 Discovery Miles 16 100 Ships in 12 - 19 working days
Network Science and Cybersecurity (Hardcover, 2014 ed.): Robinson E. Pino Network Science and Cybersecurity (Hardcover, 2014 ed.)
Robinson E. Pino
R4,472 R2,065 Discovery Miles 20 650 Save R2,407 (54%) Ships in 12 - 19 working days

"Network Science and Cybersecurity" introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .

Social Networks: A Framework of Computational Intelligence (Hardcover, 2014): Witold Pedrycz, Shyi-Ming Chen Social Networks: A Framework of Computational Intelligence (Hardcover, 2014)
Witold Pedrycz, Shyi-Ming Chen
R5,160 Discovery Miles 51 600 Ships in 12 - 19 working days

This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms. The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling. Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social networks, business intelligence and forming collaboration schemes.

Given the subject area, this book is aimed at a broad audience of researchers and practitioners. Owing to the nature of the material being covered and a way it is organized, the volume will appeal to the well-established communities including those active in various disciplines in which social networks, their analysis and optimization are of genuine relevance. Those involved in operations research, management, various branches of engineering, and economics will benefit from the exposure to the subject matter.

Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems (Hardcover, 1st ed. 2018): Moamar... Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems (Hardcover, 1st ed. 2018)
Moamar Sayed-Mouchaweh
R2,917 Discovery Miles 29 170 Ships in 10 - 15 working days

Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both physical and cyber components requires tools allowing analyzing and modeling both the discrete and continuous dynamics. Therefore, many CPS can be modeled as hybrid dynamic systems in order to take into account both discrete and continuous behaviors as well as the interactions between them. Guaranteeing the security and safety of CPS is a challenging task because of the inherent interconnected and heterogeneous combination of behaviors (cyber/physical, discrete/continuous) in these systems. This book presents recent and advanced approaches and tech-niques that address the complex problem of analyzing the diagnosability property of cyber physical systems and ensuring their security and safety against faults and attacks. The CPS are modeled as hybrid dynamic systems using different model-based and data-driven approaches in different application domains (electric transmission networks, wireless communication networks, intrusions in industrial control systems, intrusions in production systems, wind farms etc.). These approaches handle the problem of ensuring the security of CPS in presence of attacks and verifying their diagnosability in presence of different kinds of uncertainty (uncertainty related to the event occurrences, to their order of occurrence, to their value etc.).

The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback): Stephen D Gantz The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback)
Stephen D Gantz
R901 Discovery Miles 9 010 Ships in 12 - 19 working days

"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.

IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements.

This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the resultsDiscusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of eachCovers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIECIncludes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM

Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback): Vinod Joseph,... Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,427 Discovery Miles 14 270 Ships in 12 - 19 working days

"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments.

This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture.

If you're a network designer or architect, a technical sales professional, or if you're pursuing technical certifications, you will benefit from "Network Convergence"'s fundamental information on this rapidly evolving technology.
Discusses architectural nuances and includes practical case studies for deploying the next-generation framework for each service type Explains data center and cloud computing interconnect schemes for building next-generation cloud infrastructures that support a new array of requirements Provides configuration schemes from leading vendors, including Cisco, Juniper and Alcatel

Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New): Nicholas MR Grant, Joseph II Shaw Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New)
Nicholas MR Grant, Joseph II Shaw
R1,025 Discovery Miles 10 250 Ships in 12 - 19 working days

"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

analysis of forensic artifacts in common UC attacks

an in-depth look at established UC technologies and attack exploits

hands-on understanding of UC attack vectors and associated countermeasures

companion website http: //secvoip.comgiving readers access to the most up-to-date information on UC attacks.

Provides key information for hackers and pen testers on the most current Unified Communications implementations.

The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "

Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.): Jan... Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.)
Jan Schaffner
R3,142 R1,891 Discovery Miles 18 910 Save R1,251 (40%) Ships in 12 - 19 working days

With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.

Amazon Elasticsearch Service Developer Guide (Hardcover): Documentation Team Amazon Elasticsearch Service Developer Guide (Hardcover)
Documentation Team
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days
Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China,... Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China, October 19-21, 2016, Proceedings (Hardcover, 1st ed. 2019)
Daoliang Li
R2,979 Discovery Miles 29 790 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.

FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed): Laura P Taylor FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed)
Laura P Taylor
R1,579 Discovery Miles 15 790 Ships in 12 - 19 working days

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. "

FISMA Compliance Handbook Second Edition, "also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Includes new information on cloud computing compliance from Laura Taylor, the federal government s technical lead for FedRAMP

Includes coverage for both corporate and government IT managers

Learn how to prepare for, perform, and document FISMA compliance projects

This book is used by various colleges and universities in information security and MBA curriculums. "

Passive Optical Components for Optical Fiber Transmission (Hardcover): Norio Kashima Passive Optical Components for Optical Fiber Transmission (Hardcover)
Norio Kashima
R2,702 Discovery Miles 27 020 Ships in 10 - 15 working days

Focusing on connection technologies used for both single-mode and multimode fibers, this book explains multifiber connections such as mass-fusion splice and multifiber connectors. Information on fluoride glass fibers, doped fibers (EDFA), and components is included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
Cybersecurity - A Simple Beginner's…
Quinn Kiser Hardcover R724 R640 Discovery Miles 6 400
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730

 

Partners