![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.
A comprehensive look at the emerging science of networks Network science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people. This is the first book to take a comprehensive look at this emerging science. It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk. The book's uniqueness lies in its integration of concepts across computer science, biology, physics, social network analysis, economics, and marketing. The book is divided into easy-to-understand topical chapters and the presentation is augmented with clear illustrations, problems and answers, examples, applications, tutorials, and a discussion of related Java software. Chapters cover: Origins Graphs Regular Networks Random Networks Small-World Networks Scale-Free Networks Emergence Epidemics Synchrony Influence Networks Vulnerability Net Gain Biology This book offers a new understanding and interpretation of the field of network science. It is an indispensable resource for researchers, professionals, and technicians in engineering, computing, and biology. It also serves as a valuable textbook for advanced undergraduate and graduate courses in related fields of study.
QoS, short for "quality of service," is one of the most important
goals a network designer or administrator will have. Ensuring that
the network runs at optimal precision with data remaining accurate,
traveling fast, and to the correct user are the main objectives of
QoS. The various media that fly across the network including voice,
video, and data have different idiosyncrasies that try the
dimensions of the network. This malleable network architecture
poses an always moving potential problem for the network
professional.
The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Awarded by the International Calabria's Prize!
Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.
Wireless networking is poised to have a massive impact on
communications, and the 802.11 standard is to wireless networking
what Ethernet is to wired networking. There are already over 50
million devices using the dominant IEEE 802.11 (essentially
wireless Ethernet) standard, with astronomical growth predicted
over the next 10 years. New applications are emerging every day,
with wireless capability being embedded in everything from electric
meters to hospital patient tracking systems to security devices.
Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.
Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.
Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.
This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.
Rapidly generating and processing large amounts of data, supercomputers are currently at the leading edge of computing technologies. Supercomputers are employed in many different fields, establishing them as an integral part of the computational sciences Research and Applications in Global Supercomputing investigates current and emerging research in the field, as well as the application of this technology to a variety of areas. Highlighting a broad range of concepts, this publication is a comprehensive reference source for professionals, researchers, students, and practitioners interested in the various topics pertaining to supercomputing and how this technology can be applied to solve problems in a multitude of disciplines.
Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.
The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.
This is a book that will create enormous debate within the
technical and the counter-terrorism communities. While there will
be the inevitable criticism that the material contained in the book
could be used maliciously, the fact is that this knowledge is
already in the hands of our enemies. This book is truly designed to
inform while entertaining (and scaring) the reader, and it will
instantly be in demand by readers of "Stealing the Network: How to
Own the Box"
"Wifi, WiMAX, and Cellular Multihop Network"s presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in learning more about WiFi and WiMAX multihop relay networks. |
You may like...
Biz4Kids - A Business Model Comic for…
Alexander Osterwalder, Holger Nils Pohl
Paperback
R666
Discovery Miles 6 660
|