![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
In today's dynamic business environment, IT departments are under permanent pressure to meet two divergent requirements: to reduce costs and to support business agility with higher flexibility and responsiveness of the IT infrastructure. Grid and Cloud Computing enable a new approach towards IT. They enable increased scalability and more efficient use of IT based on virtualization of heterogeneous and distributed IT resources. This book provides a thorough understanding of the fundamentals of Grids and Clouds and of how companies can benefit from them. A wide array of topics is covered, e.g. business models and legal aspects. The applicability of Grids and Clouds in companies is illustrated with four cases of real business experiments. The experiments illustrate the technical solutions and the organizational and IT governance challenges that arise with the introduction of Grids and Clouds. Practical guidelines on how to successfully introduce Grids and Clouds in companies are provided.
This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well-founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common understanding using economic aspects, and to provide cost transparency for the senior management.
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion
This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the International Conference on Communication, Devices and Networking (ICCDN 2019), which was organized by the Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim, India, on 9-10 December 2019. Gathering cutting-edge research papers prepared by researchers, engineers and industry professionals, it will help young and experienced scientists and developers alike to explore new perspectives, and offer them inspirations on how to address real-world problems in the areas of electronics, communication, devices and networking.
Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.
This monograph describes the synthesis and use of biologically-inspired artificial hydrocarbon networks (AHNs) for approximation models associated with machine learning and a novel computational algorithm with which to exploit them. The reader is first introduced to various kinds of algorithms designed to deal with approximation problems and then, via some conventional ideas of organic chemistry, to the creation and characterization of artificial organic networks and AHNs in particular. The advantages of using organic networks are discussed with the rules to be followed to adapt the network to its objectives. Graph theory is used as the basis of the necessary formalism. Simulated and experimental examples of the use of fuzzy logic and genetic algorithms with organic neural networks are presented and a number of modeling problems suitable for treatment by AHNs are described: . approximation; . inference; . clustering; . control; . classification; and . audio-signal filtering. The text finishes with a consideration of directions in which AHNs could be implemented and developed in future. A complete LabVIEW toolkit, downloadable from the book s page at springer.com enables readers to design and implement organic neural networks of their own. The novel approach to creating networks suitable for machine learning systems demonstrated in "Artificial Organic Networks" will be of interest to academic researchers and graduate students working in areas associated with computational intelligence, intelligent control, systems approximation and complex networks."
Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.
This edited book presents the results of the 5th Workshop on Real-world Wireless Sensor Networks (REALWSN). The purpose of this workshopwas to bring together researchers and practitioners working in the area of sensor networks, with focus on real-world experiments or deployments of wireless sensor networks. Included were, nonetheless, emerging forms of sensing such as those that leverage smart phones, Internet of Things, RFIDs, and robots. Indeed, when working with real-world experiments or deployments, many new or unforeseen issues may arise: the network environment may be composed of a variety of different technologies, leading to very heterogeneous network structures; software development for large scale networks poses new types of problems; the performance of prototype networks may differ significantly from the deployed system; whereas actual sensor network deployments may need a complex combination of autonomous and manual configuration. Furthermore, results obtained through simulation are typically not directly applicable to operational networks; it is therefore imperative for the community to produce results from experimental research. The workshop collected the state of the art in emerging and current research trends dealing with Real-world Wireless Sensor Networks, with the aim of representing a stepping stone for future research in this field."
The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures, embedded processing, sensor fusion and middleware, calibration and topology, network-based detection and tracking, and applications in distributed and collaborative methods in camera networks. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate students working in signal and video processing, computer vision, and sensor networks. Hamid Aghajan is a Professor of Electrical Engineering (consulting) at Stanford University. His research is on multi-camera networks for smart environments with application to smart homes, assisted living and well being, meeting rooms, and avatar-based communication and social interactions. He is Editor-in-Chief of Journal of Ambient Intelligence and Smart Environments, and was general chair of ACM/IEEE ICDSC 2008. Andrea Cavallaro is Reader (Associate Professor) at Queen Mary,
University of London (QMUL). His research is on target tracking and
audiovisual content analysis for advanced surveillance and
multi-sensor systems. He serves as Associate Editor of the IEEE
Signal Processing Magazine and the IEEE Trans. on Multimedia, and
has been general chair of IEEE AVSS 2007, ACM/IEEE ICDSC 2009 and
BMVC 2009.
Cisco IOS (the software that runs the vast majority of Cisco
routers and all Cisco network switches) is the dominant routing
platform on the Internet and corporate networks. This widespread
distribution, as well as its architectural deficiencies, makes it a
valuable target for hackers looking to attack a corporate or
private network infrastructure. Compromised devices can disrupt
stability, introduce malicious modification, and endanger all
communication on the network. For security of the network and
investigation of attacks, in-depth analysis and diagnostics are
critical, but no book currently covers forensic analysis of Cisco
network devices in any detail.
"Deploying QoS for IP Next Generation Networks: The Definitive
Guide" provides network architects and planners with insight into
the various aspects that drive QoS deployment for the various
network types. It serves as a single source of reference for
businesses that plan to deploy a QoS framework for voice, video,
mobility and data applications creating a converged infrastructure.
It further provides detailed design and implementation details for
various service deployments across the various Cisco platforms such
as the CRS-1, 12000, 7600 & 7200 series routers that are widely
deployed in most Carrier Networks.
This superb introduction examines all aspects of implementation from concept to reality, and spells out the pros, cons, and effects of EDI in your organization. The cost of EDI hardware, software, training, transmission, and maintenance are broken down and clearly explained to prevent problems and maximize benefits. Checklists and procedural guidelines are also offered to ease your EDI transition -- so that you're never left with a system you can't put online quickly and efficiently.
Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.
This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
"Network Recovery" is the first book to provide detailed
information on protecting and restoring communication networks, and
it sets a sky-high standard for any that may follow. Inside, you ll
learn specific techniques that work at each layer of the networking
hierarchy including optical, SONET-SDH, IP, and MPLS as well as
multi-layer escalation strategies that offer the highest level of
protection. The authors begin with an incisive introduction to the
issues that define the field of network protection and restoration,
and as the book progresses they explain everything you need to know
about the relevant protocols, providing theoretical analyses
wherever appropriate. If you work for a network-dependent
organization, large or small, you ll want to keep Network Recovery
within reach at all times.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
Peer-to-Peer (P2P) networks enable users to directly share digital
content (such as audio, video, and text files) as well as real-time
data (such as telephony traffic) with other users without depending
on a central server. Although originally popularized by unlicensed
online music services such as Napster, P2P networking has recently
emerged as a viable multimillion dollar business model for the
distribution of academic and clinical information,
telecommunications, and social networking. Written at an accessible
level for any reader familiar with fundamental Internet protocols,
Peer-to-Peer Networking and Applications explains the conceptual
operations and architecture underlying basic P2P systems using
well-known commercial systems as models. The book also delineates
the latest research directions, thereby providing not only a
sophisticated understanding of current systems, but also the means
to improve upon these systems with innovations that will better
performance, security, and flexibility. Peer-to-Peer Networking and
Applications is thus both a valuable starting point and an
important reference to those practioners employed by any of the 200
companies with approximately $400 million invested in this new and
lucrative technology.
Focused on renewable energy systems and the development of information and communication technologies (ICTs) for their integration in smart grids, this book presents recent advances and methods that help to ensure that power generation from renewable sources remains stable, that power losses are minimized, and that the reliable functioning of these power generation units is maintained. The book highlights key topics and technologies for renewable energy systems including the intelligent control of power generators, power electronics that connect renewable power generation units to the grid, and fault diagnosis for power generators and power electronics. In particular, the following topics are addressed: * Modeling and control of power generators (PMSGs, DFIGs); * Modeling and control of power electronics (converters, inverters); * Modeling and fault diagnosis of the transmission and distribution Grid; and * Modelling and control of distributed power generation units (interconnected synchronous generators or photovoltaic units). Because of the above coverage, members of the wider engineering community will find that the nonlinear control and estimation methods presented provide essential insights into the functioning of renewable energy power systems, while the academic community will find the book a valuable textbook for undergraduate or graduate courses on renewable energy systems.
New security risks, continuously evolving regulation and increasing
security standards have created new and growing needs for secure
internal information transfers, which SSH provides. This book
addresses these new trends in depth, offering the most up-to-date
information on the integration of SSH into a security environment.
It covers the newest features and applications of SSH-2 (which
received Proposed Standard status from the IETF in 2006). SSH2 is
more secure than previous versions and has many expanded uses on a
wider variety of computing platforms. Another particular note
driving new SSH2 adoption are the requirements of recent
legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more
valuable tool, as it provides communications security compliance
with the latest standards.
The term Quality of Service, abbreviated QoS, refers to network
resource control mechanisms. Quality of Service is the ability to
provide different priority to different applications, users, or
data flows, or to guarantee a certain level of performance to a
data flow. This book brings all of the elements of network quality
of service (QoS) together in a single volume, saving the reader the
time and expense of making multiple purchases. It introduces
network QoS, explains the basics, describes the protocols, and
discusses advanced topics, by the best and brightest experts in the
field. It is a quick and efficient way to bring valuable content
together from leading experts in the field while creating a
one-stop-shopping opportunity for customers to receive the
information they would otherwise need to round up from separate
sources.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.
This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field. |
![]() ![]() You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,317
Discovery Miles 13 170
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,490
Discovery Miles 14 900
|