0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (335)
  • R250 - R500 (872)
  • R500+ (14,061)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Network Control and Engineering for QOS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8. Third International... Network Control and Engineering for QOS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8. Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain (Hardcover, 2005 ed.)
Dominique Gaiti, Sebastia Galmes, Ramon Puigjaner
R4,397 Discovery Miles 43 970 Ships in 10 - 15 working days

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and sponsored by the following Working Groups: WG6.2 (Network and Internetwork Architectures), WG6.6 (Management of Networks and Distributed Systems), WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. The adoption of Internet as the global network infrastructure places the issue of quality of service among one of the hot topics nowadays: a huge diversity of applications with quite different service requirements must be supported over a basic core of protocols. Also, the open and uncontrolled nature of Internet enforces the need to guarantee secure transactions among users, thus placing security as another hot topic. Finally, the explosion of mobility and its integration as part of the global infrastructure are probably now the most challenging issues in the networking field.

Harbour Protection Through Data Fusion Technologies (Hardcover, 2009 ed.): Elisa Shahbazian, Galina Rogova, Michael J. DeWeert Harbour Protection Through Data Fusion Technologies (Hardcover, 2009 ed.)
Elisa Shahbazian, Galina Rogova, Michael J. DeWeert
R5,797 Discovery Miles 57 970 Ships in 10 - 15 working days

An Advanced Research Workshop (ARW) "Data Fusion Technologies for Harbour Protection" was held in Tallinn, Estonia 27 June-1 July, 2005. This workshop was organized by request of the NATO Security Through Science Programme and the Defence Investment Division. An ARW is one of many types of funded group support mechanisms established by the NATO Science Committee to contribute to the critical assessment of existing knowledge on new important topics, to identify directions for future research, and to promote close working relationships between scientists from different countries and with different professional experiences. The NATO Science Committee was approved at a meeting of the Heads of Government of the Alliance in December 1957, subsequent to the 1956 recommendation of "Three Wise Men" - Foreign Ministers Lange (Norway), Martino (Italy) and Pearson (Canada) on Non-Military Cooperation in NATO. The NATO Science Committee established the NATO Science Programme in 1958 to encourage and support scientific collaboration between individual scientists and to foster scientific development in its member states. In 1999, following the end of the Cold War, the Science Programme was transformed so that support is now devoted to collaboration between Partner-country and NATO-country scientists or to contributing towards research support in Partner countries. Since 2004, the Science Programme was further modified to focus exclusively on NATO Priority Research Topics (i. e. Defence Against Terrorism or Countering Other Threats to Security) and also preferably on a Partner country priority area.

Cloud Computing Technologies for Connected Government (Hardcover): Zaigham Mahmood Cloud Computing Technologies for Connected Government (Hardcover)
Zaigham Mahmood
R5,281 Discovery Miles 52 810 Ships in 12 - 17 working days

In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.

Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016): George... Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016)
George Christou
R4,334 Discovery Miles 43 340 Ships in 12 - 17 working days

Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R4,078 Discovery Miles 40 780 Ships in 12 - 17 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Cloud Computing in Financial Services (Hardcover): B. Nicoletti Cloud Computing in Financial Services (Hardcover)
B. Nicoletti
R3,346 Discovery Miles 33 460 Ships in 12 - 17 working days

Financial institutions need to increase revenues, decrease cost and be compliant in these difficult times. To meet all these challenges they need to consider disruptive innovations. Cloud computing is one of them. It helps in introducing innovative services, re-engineer processes, improve agility and optimize value. The book analyses in depth the cloud computing model and its current and potential use in financial services. Cloud Computing can change the paradigm of the financial institutions. the word "Bank" comes from the Italian word "Banco," since in the 1300s banking was one on a desk in the streets. The new "banco," the new "desk," will be cloud. Financial institutions must use the model of Cloud Computing for their transformation to a new paradigm.
This book is a blend of academic research, consultancy practice and case studies. It helps in considering opportunities and risks, optimize vendor relationships and organize for the best.

Heterogeneity, High Performance Computing, Self-Organization and the Cloud (Hardcover, 1st ed. 2018): Theo Lynn, John P.... Heterogeneity, High Performance Computing, Self-Organization and the Cloud (Hardcover, 1st ed. 2018)
Theo Lynn, John P. Morrison, David Kenny
R920 Discovery Miles 9 200 Ships in 12 - 17 working days

This book is open access under a CC BY NC ND license. It addresses the most recent developments in cloud computing such as HPC in the Cloud, heterogeneous cloud, self-organising and self-management, and discusses the business implications of cloud computing adoption. Establishing the need for a new architecture for cloud computing, it discusses a novel cloud management and delivery architecture based on the principles of self-organisation and self-management. This focus shifts the deployment and optimisation effort from the consumer to the software stack running on the cloud infrastructure. It also outlines validation challenges and introduces a novel generalised extensible simulation framework to illustrate the effectiveness, performance and scalability of self-organising and self-managing delivery models on hyperscale cloud infrastructures. It concludes with a number of potential use cases for self-organising, self-managing clouds and the impact on those businesses.

Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New): Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New)
R2,514 Discovery Miles 25 140 Ships in 12 - 17 working days

Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

Future Information Technology - FutureTech 2013 (Hardcover, 2014 ed.): James J (Jong Hyuk) Park, Ivan Stojmenovic, Min Choi,... Future Information Technology - FutureTech 2013 (Hardcover, 2014 ed.)
James J (Jong Hyuk) Park, Ivan Stojmenovic, Min Choi, Fatos Xhafa
R7,101 R6,662 Discovery Miles 66 620 Save R439 (6%) Ships in 12 - 17 working days

Future technology information technology stands for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, user experience and HCI, security and trust computing and so on, for satisfying our ever-changing needs. In past twenty five years or so, Information Technology (IT) influenced and changed every aspect of our lives and our cultures. These proceedings foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization.

Amazon Elastic File System User Guide (Hardcover): Documentation Team Amazon Elastic File System User Guide (Hardcover)
Documentation Team
R1,291 Discovery Miles 12 910 Ships in 10 - 15 working days
Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019): Song Y. Yan Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019)
Song Y. Yan
R3,440 Discovery Miles 34 400 Ships in 10 - 15 working days

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.): Pascal Bouvry, Horacio... Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.)
Pascal Bouvry, Horacio Gonzalez-Velez, Joanna Kolodziej
R4,415 Discovery Miles 44 150 Ships in 10 - 15 working days

One of the most challenging issues for the intelligent decision systems is to effectively manage the large-scale complex distributed environments such as computational clouds, grids, ad hoc and P2P networks, under the different types of users, their relations, and real-world uncertainties. In this context the IT resources and services usually belong to different owners (institutions, enterprises, or individuals) and are managed by different administrators. These administrators conform to different sets of rules and configuration directives, and can impose different usage policies on the system users. Additionally, uncertainties are presented in various types of information that are incomplete, imprecise, fragmentary or overloading, which hinders the full and precise determination of the evaluation criteria, their subsequent and selection, the assignment scores, and eventually the final integrated decision result.

This book presents new ideas, analysis, implementations and evaluation of the next generation intelligent techniques for solving complex decision problems in large-scale distributed systems. In 15 chapters several important formulations of the decision problems in heterogeneous environments are identified and a review of the recent approaches, from game theoretical models and computational intelligent techniques, such as genetic, memetic and evolutionary algorithms, to intelligent multi-agent systems and networking are presented. We believe that this volume will serve as a reference for the students, researchers and industry practitioners working in or are interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp key concerns and potential solutions on the selected topics."

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R3,004 Discovery Miles 30 040 Ships in 10 - 15 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

Libro Cientifico - Investigaciones En Tecnologias de Informacion Informatica y Computacion (English, Spanish, Hardcover): Jorge... Libro Cientifico - Investigaciones En Tecnologias de Informacion Informatica y Computacion (English, Spanish, Hardcover)
Jorge Vasquez
R731 Discovery Miles 7 310 Ships in 12 - 17 working days

Biografias Lotzy Beatriz Fonseca Chiu. Nacio en Guadalajara, Jalisco, estudio la Licenciatura en Informatica en la Universidad de Guadalajara, actualmente Profesor en el Centro Universitario de Ciencias Exactas e Ingenierias CUCEI, y asesor adjunto en el Sistema de Universidad Virtual de la Universidad de Guadalajara. Ganadora del 6to concurso de docentes innovadores organizado por Microsoft. Maria Elena Romero Gastelu. Nacio en Xalapa Enriquez, Veracruz, estudio la Licenciatura en Informatica en el Instituto Tecnologico de Tepic y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, ha sido Profesor en el Departamento de Ciencias Computacionales por 16 anos. Luis Antonio Medellin Serna. Nacio Mazatlan, Sinaloa, estudio la Licenciatura en Informatica y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, ha sido profesor en el Departamento de Ciencias Computacionales por 12 anos. Jorge Lorenzo Vasquez Padilla. Nacio Guadalajara, Jalisco, estudio la Licenciatura en Matematicas con la Orientacion en Computacion y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, estudio la Maestria en Redes y Comunicaciones en la Universidad Catolica de Avila (Zaragoza, Espana), ademas obtuvo la certificacion en el programa CCNA como instructor en Redes de Computadoras que otorga la Compania Cisco Systems, ha sido profesor en el Departamento de Ciencias Computacionales desde su creacion.

Surviving Cyberwar (Hardcover): Richard Stiennon Surviving Cyberwar (Hardcover)
Richard Stiennon
R2,274 Discovery Miles 22 740 Ships in 12 - 17 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition.
2nd Printing. 2008): Deo... Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition. 2nd Printing. 2008)
Deo Prakash Vidyarthi, Biplab Kumer Sarker, Anil Kumar Tripathi, Laurence Tianruo Yang
R4,384 Discovery Miles 43 840 Ships in 10 - 15 working days

Scheduling in Distributed Computing Systems: Analysis, Design and Models intends to inculcate the innovative ideas for the scheduling aspect. Although the models in this book are designed for distributed systems, the same information is applicable for any type of system (i.e., where distributed processing is required). Scheduling in Distributed Computing Systems: Analysis, Design and Models will dramatically improve the design and management of the processes for industry professionals. This book deals exclusively with the scheduling aspect, which finds little space in other distributed operating system books. Scheduling in Distributed Computing Systems: Analysis, Design and Models is structured for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a reference for graduate-level students in management sciences, and computer science for distributed computing system classes.

Regularized Radial Basis Function Networks - Theory & Applications (Hardcover): PV Yee Regularized Radial Basis Function Networks - Theory & Applications (Hardcover)
PV Yee
R4,209 Discovery Miles 42 090 Ships in 10 - 15 working days

Simon Haykin is a well-known author of books on neural networks.
* An authoritative book dealing with cutting edge technology.
* This book has no competition.

RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl): Paris Kitsos, Yan Zhang RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl)
Paris Kitsos, Yan Zhang
R4,425 Discovery Miles 44 250 Ships in 12 - 17 working days

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.

Real-Time Systems - Design Principles for Distributed Embedded Applications (Hardcover, 2nd ed. 2011): Hermann Kopetz Real-Time Systems - Design Principles for Distributed Embedded Applications (Hardcover, 2nd ed. 2011)
Hermann Kopetz
R2,686 Discovery Miles 26 860 Ships in 10 - 15 working days

"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract conceptsaccessible for a wide audience."
Janos Sztipanovits, Director
E. Bronson Ingram Distinguished Professor of Engineering
Institute for Software Integrated Systems
Vanderbilt University

"Real-Time Systems" focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the first edition, new developments incomplexity management, energy and power management, dependability, security, andthe internet of things, are addressed.

The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike."

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R3,059 Discovery Miles 30 590 Ships in 12 - 17 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

Broadband Satellite Communication Systems and the Challenges of Mobility - IFIP TC6 Workshops on Broadband Satellite... Broadband Satellite Communication Systems and the Challenges of Mobility - IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges of Mobility, World Computer Congress August 22-27, 2004, Toulouse, France (Hardcover, 2005 ed.)
Thierry Gayraud, Michel Mazella, Fernando Pedro Lopes Boavida Fernandes, Edmundo Heitor da Silva Monteiro, Joao Gilberto De Matos Orvalho
R3,028 Discovery Miles 30 280 Ships in 10 - 15 working days

Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professional researchers in the field of telecommunications, computer networking and wireless networks.

Recently the request of multimedia services has been rapidly increasing and satellite networks appear to be attractive for a fast service deployment and for extending the typical service area of terrestrial systems. In comparison with traditional wide area networks, a characteristic of satellite communication systems is their ability in broadcasting and multicasting multimedia information flows anywhere over the satellite coverage. The papers presented in this volume highlight key areas such as Satellite Network Architectures, Services and Applications; Mobile Satellite Systems and Services; and Hybrid Satellite and Terrestrial Networks.

Mobility will inevitably be one of the main characteristics of future networks, terminals and applications and, thus, extending and integrating fixed network protocols and services to mobile systems represents one of the main issues of present networking. The secondary focus of this volume is on challenges of mobility, that is, on technologies, protocols and services for the support of seamless and nomadic user access to new classes of applications in person-to-person, device-to-device and device-to-person environments. The book comprises recent results of research and development in the following areas; Seamless mobility; Mobile ad hoc and sensor networks; Analysis, simulation and measurements of mobile and wireless systems; Integration and inter-working of wired and wireless networks; QoS in mobile and wireless networks; Future trends and issues concerning mobility.

This state -of-the-art volume contains a collection of papers from two of the workshops of the 18th IFIP World Computer Congress, held August 22-27, 2004, in Toulouse, France: the Workshop on Broadband Satellite Communication Systems, and the Workshop on the Challenges of Mobility.

Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.): Zoltan Juhasz, Peter Kacsuk, Dieter... Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.)
Zoltan Juhasz, Peter Kacsuk, Dieter Kranzlmuller
R2,882 Discovery Miles 28 820 Ships in 10 - 15 working days

DAPSY (Austrian-Hungarian Workshop on Distributed and Parallel Systems) is an international conference series with biannual events dedicated to all aspects of distributed and parallel computing. DAPSY started under a different name in 1992 (Sopron, Hungary) as regional meeting of Austrian and Hungarian researchers focusing on transputer-related parallel computing; a hot research topic of that time. A second workshop followed in 1994 (Budapest, Hungary). As transputers became history, the scope of the workshop widened to include parallel and distributed systems in general and the 1st DAPSYS in 1996 (Miskolc, Hungary) reflected the results of these changes.

Distributed and Parallel Systems: Cluster and Grid Computing is an edited volume based on DAPSYS, 2004, the 5th Austrian-Hungarian Workshop on Distributed and Parallel Systems. The workshop was held in conjunction with EuroPVM/MPI-2004, Budapest, Hungary September 19-22, 2004.

RFID Security - A Lightweight Paradigm (Hardcover, 1st ed. 2017): Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi RFID Security - A Lightweight Paradigm (Hardcover, 1st ed. 2017)
Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi
R3,358 Discovery Miles 33 580 Ships in 12 - 17 working days

This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

Intelligent Multimedia Technologies for Networking Applications - Techniques and Tools (Hardcover, New): Dimitris N.... Intelligent Multimedia Technologies for Networking Applications - Techniques and Tools (Hardcover, New)
Dimitris N. Kanellopoulos
R5,200 Discovery Miles 52 000 Ships in 12 - 17 working days

As ubiquitous multimedia applications benefit from the rapid development of intelligent multimedia technologies, there is an inherent need to present frameworks, techniques and tools that adopt these technologies to a range of networking applications. Intelligent Multimedia Technologies for Networking Applications: Techniques and Tools promotes the discussion of specific solutions for improving the quality of multimedia experience while investigating issues arising from the deployment of techniques for adaptive video streaming. This reference source provides relevant theoretical frameworks and leading empirical research findings and is suitable for practitioners and researchers in the area of multimedia technology.

The Secure Information Society - Ethical, Legal and Political Challenges (Hardcover, 2013 ed.): Joerg Kruger, Bertram Nickolay,... The Secure Information Society - Ethical, Legal and Political Challenges (Hardcover, 2013 ed.)
Joerg Kruger, Bertram Nickolay, Sandro Gaycken
R3,698 R3,389 Discovery Miles 33 890 Save R309 (8%) Ships in 12 - 17 working days

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Don't Give Up, Don't Give In - Life…
Louis Zamperini, David Rensin Paperback  (2)
R320 R290 Discovery Miles 2 900
Tower S4513 Rect. White Label Sheets…
R43 R36 Discovery Miles 360
Closer To Love - How To Attract The…
Vex King Paperback R360 R326 Discovery Miles 3 260
Forward!
Yorick Blumenfeld Paperback R427 Discovery Miles 4 270
Zulfies Perfume Inspired by Armani Black…
R250 R99 Discovery Miles 990
Samsung TAB A9…
R5,599 Discovery Miles 55 990
Fragluxe Cuba Gold Gift Set (5 Piece…
R1,029 Discovery Miles 10 290
Zulfies Perfume Inspired by Gucci Guilty…
R250 R99 Discovery Miles 990
Becoming
Michelle Obama CD  (1)
R555 R460 Discovery Miles 4 600
Post-It Flag Arrows (140 Flags)
R100 Discovery Miles 1 000

 

Partners