Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.
Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica ?ber with a single wavelength modulated at low data rates, it was quickly demonstrated that ?ber can deliver much more bandwidth than any other transmission medium, twisted pair wire, coaxial cable, or wireless. Since then, the optical network evolved to include more exciting technologies, gratings, optical ?lters, optical multiplexers, and optical ampli?ers so that today a single ?ber can transport an unprecedented aggregate data rate that exceeds Tbps, and this is not the upper limit yet. Thus, the ?ber optic network has been the network of choice, and it is expected to remain so for many generationsto come, for both synchronousand asynchronouspayloads; voice, data, video, interactive video, games, music, text, and more. In the last few years, we have also witnessed an increase in network attacks as a result of store andforwardcomputer-basednodes. These attackshave manymaliciousobjectives: harvestsomeone else's data, impersonate another user, cause denial of service, destroy ?les, and more. As a result, a new ?eld in communicationis becomingimportant, communicationnetworksand informationse- rity. In fact, the network architect and system designer is currently challenged to include enhanced features such as intruder detection, service restoration and countermeasures, intruder avoidance, and so on. In all, the next generation optical network is intelligent and able to detect and outsmart malicious intruders.
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. The move to cloud computing is no longer merely a topic of discussion; it has become a core competency that every modern business needs to embrace and excel at. It has changed the way enterprise and internet computing is viewed, and this success story is the result of the long-term efforts of computing research community around the globe. It is predicted that by 2026 more than two-thirds of all enterprises across the globe will be entirely run in cloud. These predictions have led to huge levels of funding for research and development in cloud computing and related technologies. Accordingly, universities across the globe have incorporated cloud computing and its related technologies in their curriculum, and information technology (IT) organizations are accelerating their skill-set evolution in order to be better prepared to manage emerging technologies and public expectations of the cloud, such as new services.
FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for Distributed Systems and Communication Protocols) and PSTV (Protocol Specification, Testing and Verification) conferences. This year the conference has a new name FORTE (Formal Techniques for Networked and Distributed Systems). The previous FORTE began in 1989 and the PSTV conference in 1981. Therefore the new FORTE conference actually has a long history of 21 years. The purpose of this conference is to introduce theories and formal techniques applicable to various engineering stages of networked and distributed systems and to share applications and experiences of them. This FORTE 2001 conference proceedings contains 24 refereed papers and 4 invited papers on the subjects. We regret that many good papers submitted could not be published in this volume due to the lack of space. FORTE 2001 was organized under the auspices of IFIP WG 6.1 by Information and Communications University of Korea. It was financially supported by Ministry of Information and Communication of Korea. We would like to thank every author who submitted a paper to FORTE 2001 and thank the reviewers who generously spent their time on reviewing. Special thanks are due to the reviewers who kindly conducted additional reviews for rigorous review process within a very short time frame. We would like to thank Prof. Guy Leduc, the chairman of IFIP WG 6.1, who made valuable suggestions and shared his experiences for conference organization.
Semantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. First, scientific issues of semantic grid systems are covered, followed by two basic technical issues, data-level semantic mapping, and service-level semantic interoperating. Two killer applications are then introduced to show how to build a semantic grid for specific application domains. Although this book is organized in a step by step manner, each chapter is independent. Detailed application scenarios are also presented. In 1990, Prof. Wu invented the first KB-system tool, ZIPE, based on C on a SUN platform. He proposed the first coupling knowledge representing model, Couplingua, which embodies Rule, Frame, Semantic Network and Nerve Cell Network, and supports symbol computing and data processing computing. His current focus is on semantic web, grid & ubiquitous computing, and their applications in the life sciences.
The goal of this book is to present and compare various options one
for systems architecture from two separate points of view. One,
that of the information technology decision-maker who must choose a
solution matching company business requirements, and secondly that
of the systems architect who finds himself between the rock of
changes in hardware and software technologies and the hard place of
changing business needs.
Since 1990 the German Research Society (Deutsche Forschungsgemeinschaft, DFG) has been funding PhD courses (Graduiertenkollegs) at selected universi- ties in the Federal Republic of Germany. TU Berlin has been one of the first universities joining that new funding program of DFG. The PhD courses have been funded over aperiod of 9 years. The grant for the nine years sums up to approximately 5 million DM. Our Grnduiertenkolleg on Communication-based Systems has been assigned to the Computer Science Department of TU Berlin although it is a joined effort of all three universities in Berlin, Technische Uni- versitat (TU), Freie Universitat (FU), and Humboldt Universitat (HU). The Graduiertenkolleg has been started its program in October 1991. The professors responsible for the program are: Hartmut Ehrig (TU), Gunter Hommel (TU), Stefan Jahnichen (TU), Peter Lohr (FU), Miroslaw Malek (RU), Peter Pep- per (TU), Radu Popescu-Zeletin (TU), Herbert Weber (TU), and Adam Wolisz (TU). The Graduiertenkolleg is a PhD program for highly qualified persons in the field of computer science. Twenty scholarships have been granted to fellows of the Graduiertenkolleg for a maximal period of three years. During this time the fellows take part in a selected educational program and work on their PhD thesis.
• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years
This book provides a comprehensive methodology for analysis and evaluation of technical characteristics and features of distributed networks and systems management platforms. The analysis covers management platforms run-time, development, and implementation environments. Operability, scalability, interoperability, and aspects of applications portability are discussed. Topics include: open systems and distributed management platforms; analysis of management platform components such as graphical user interface, event management, communications, object manipulation, database management, hardware, operating systems, distributed directory, security and time services; in-depth analysis of network and systems management applications; comprehensive evaluation of Bull ISM/OpenMaster, Cabletron Spectrum, Cambio Networks (COMMAND), Computer Associates CA-Unicenter, DEC TeMIP and PolyCenter NetView, HP OpenView, IBM NetView for AIX and TMN WorkBench for AIX Applications Development Environment, Microsoft SMS, Network Management Forum SPIRIT, Remedy Corporation ARS, Sun Solstice Enterprise Manager and SunNet Manager, and Tivoli TME management platforms and their applications; state-of-the-art in distributed management technology; network and systems management standards; practical information on evaluating and selecting management platformsA/LISTA. Networks and Systems Management: Platforms Analysis and Evaluation is a technical reference work on distributed management platforms for network operators, systems administrators, computer engineers, network designers, developers and planners. It can also be used as an advanced level textbook or reference work in courses on operation and management ofdata communications, telecommunications and distributed computing systems.
High-Speed Networking for Multimedia Applications presents the latest research on the architecture and protocols for high-speed networks, focusing on communication support for distributed multimedia applications. This includes the two major issues of ATM Networking and quality of service for multimedia applications. It is to be expected that most of the bandwidth in future high-speed networks will be taken up by multimedia applications, transmitting digital audio and video. Traditional networking protocols are not suitable for this as they do not provide guaranteed bandwidth, end-to-end delay or delay jitter, nor do they have addressing schemes or routing algorithms for multicast connections. High-Speed Networking for Multimedia Applications is a collection of high quality research papers which address these issues, providing interesting and innovative solutions. It is an essential reference for engineers and computer scientists working in this area. It is also a comprehensive text for graduate students of high-speed networking and multimedia applications.
From the reviews: "This book is intended for an assembly production house setting, appropriate for management, designers, chief operators, as well as wirebond production engineers. Operational issues such as specifying and optimizing wire and automatic bonders for a product line are included. The book is very good with "visual" explanations for quick grasping of the issues. In addition, the fundamental metallurgical or mechanical root causes behind material and process choices are presented. The book has a clear prose style and a very readable font and page layout. The figures, although effective, are simply low resolution screen prints from a personal computer and thus have aliasing and fuzziness. This book has excellent overall tutorial and enough description of wire and bonding equipment so the reader could specify and negotiate correctly for with suppliers. The majority of the book dwells on establishing the bonding process for a particular product; determining the "window" of adjustments. The book ends with discussions on establishing quality metrics and reliability assurance tests. Each chapter of the book includes enough tutorial information to allow it to alone with little need to page backwards. A short but good reference section is at the end. If you have not read a wirebonding book, or the one you read 10 years ago was borrowed and never returned, now is the time to buy this book." (" CMPT Newsletter," June 2005)
Adoption of Bluetooth wireless technology has made great strides in
the last few years. One of the biggest steps forward the
standardization of Java APIs for Bluetooth wireless technology
(JABWT) is explained in detail in this book. The JABWT standard,
defined by the JSR-82 specification, supports rapid development of
Bluetooth applications that are portable, secure, and
highly-usable. Wireless device manufacturers have responded to the
JABWT specification by announcing mobile phones and other products
that will run JABWT applications. Bluetooth Application Programming
with the Java APIs explains in detail how to write Bluetooth
applications using the Java APIs to exploit the power of both
technologies. Written by the specification lead for JSR-82 and two
other key participants in the definition of JABWT, this book
provides the authoritative explanations and concrete examples you
need to get started right away.
This book gives a thorough explanation of standardization, its processes, its life cycle, and its related organization on a national, regional and global level. The book provides readers with an insight in the interaction cycle between standardization organizations, government, industry, and consumers. The readers can gain a clear insight to standardization and innovation process, standards, and innovations life-cycle and the related organizations with all presented material in the field of information and communications technologies. The book introduces the reader to understand perpetual play of standards and innovation cycle, as the basis for the modern world.
High-Performance Networks for Multimedia Applications presents the latest research on the services and protocols for networks providing the communication support for distributed multimedia applications. The need for end-to-end QoS for these multimedia applications is raising the stakes for a powerful shaping and scheduling in the network adapter. It is also creating a need for new services at the ATM layer, CBR and VBR being augmented by UBR, ABR and GFR which have to be evaluated in the TCP/IP environment of today and tomorrow. With the pressure of all the new technologies available today, the backbone architecture needs to be revisited and the success of the TCP/IP must not eliminate the possibility of adding a native ATM access to it. Most of the research in communication services such as IntServ, DiffServ and Native ATM is driven by the requirements of multimedia systems and this book illustrates the new emphasis by bringing telecommunication and computer communication experts together with application designers. This is particularly true for the security issues also addressed here. Last but not least, modeling techniques and mathematical models are essential to assess the performance of the networks to be built and to evaluate next century scenarios unachievable by a simple scaling of today's solutions. High-Performance Networks for Multimedia Applications is a collection of high quality research papers and the in-depth treatment of the subjects provides interesting and innovative solutions. It is an essential reference for telecommunication and computer experts and QoS-based application designers. It is also a comprehensive text for graduate students in high-perforrnance networks and multimedia applications.
Broadband Fixed Wireless Access provides a systematic overview of the emerging WiMAX technology, and much of the material is based on the practical experiences of the authors in building new systems. This material will be of significant interest to network architects and developers of broadband fixed wireless access products. With the advent of the IEEE 802.16 standard (has the standard or any part of it been adopted or is likely to be adopted soon) and next generation equipment, this technology has been growing in interest. The authors discuss applications at microwave frequencies between 2 and 11 GHz that could be attractive options for operators without an existing access infrastructure for reaching end users. This introductory volume demystifies the technology and provides technical exposure to the various system trade-offs. Additionally, the book features the following highlights: detailed modeling of broadband fixed wireless access propagation channel, including new measurements for its time variation; an extensive overview of the IEEE 802.1 discussion of the suitability of various multi-antenna techniques; and elaboration of various techniques, i.e. autodirecting antennas, bridging with WLAN, and multi-hop networking, that can be used to reduce the cost of ownership of a WiMAX network for an operator. The authors cover a wide range of topics, from network deployment to implementation of terminals. Wireless professionals will gain a head start from the information on WiMAX technology. This is a must read book when starting with broadband fixed wireless access.
This book presents the combined peer-reviewed proceedings of the tenth International Symposium on Intelligent Distributed Computing (IDC'2016), which was held in Paris, France from October 10th to 12th, 2016. The 23 contributions address a range of topics related to theory and application of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.
The vast reduction in size and power consumption of CMOS circuitry
has led to a large research effort based around the vision of
ubiquitous networks of wireless communication nodes. The wireless
devices are usually designed to run on batteries. However, as the
networks increase in number and the devices decrease in size, the
replacement of depleted batteries is not practical. Furthermore, a
battery that is large enough to last the lifetime of the device
would dominate the overall system size, and thus is not very
attractive. There is clearly a need to explore alternative methods
of powering these small communication nodes. This book, therefore,
focuses on potential "ambient" sources of power that can be
scavenged or harvested and subsequently used to run low power
electronics and wireless transceivers.
Voice Over Internet Protocol Security has been designed to help the
reader fully understand, prepare for and mediate current security
and QoS risks in today s complex and ever changing converged
network environment and it will help you secure your VoIP network
whether you are at the planning, implementation, or
post-implementation phase of your VoIP infrastructure.
The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.
This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.
This text evaluates wideband CDMA as an effective third generation technology option, giving a picture of the various wideband CDMA standardization activities underway worldwide in the late 1990s. The book compares a range of CDMA design techniques and examines how each affects system performance. It also describes how third generation system applications will impact radio access system design and compares and contrasts each major wideband CDMA standardization proposal currently on the table, including FRAMES wideband CDMA in Europe, Core-A in Japan, wideband IS-95 in the US, and wideband CDMA in Korea. It identifies and describes various air interface access schemes for third and fourth generation mobile communications systems; analyzes wideband CDMA performance in varying radio environments; and discusses the integration of the GSM core network with wideband CDMA.
An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.
With the rapid growth of bandwidth demand from network users and the advances in optical technologies, optical networks with multiterabits per-second capacity has received significant interest from both researchers and practitioners. Optical networks deployment raises a number of challenging problems that require innovative solutions, including net work architectures, scalable and fast network management, resource efficient routing and wavelength assignment algorithms, QoS support and scheduling algorithms, and switch and router architectures. In this book, we put together some important developments in this exiting area during last several years. Some of the articles are research papers and some are surveys. All articles were reviewed by two reviewers. The paper, "On Dynamic Wavelength Assignment in WDM Optical Networks," by Alanyali gives an overview of some issues in the analy sis and synthesis of dynamic wavelength assignment policies for optical WDM networks and illustrates a new method of analysis. The paper by Ellinas and Bala, "Wavelength Assignment Algorithms for WDM Ring Architectures," presents two optimal wavelength assignment algorithms that assign the minimum number of wavelengths between nodes on WDM rings to achieve full mesh connectivity. In the paper, "Optimal Placement of Wavelength Converters in WDM Networks for Parallel and Distributed Computing Systems," Jia et al." |
You may like...
Internet of Things (IoT) for Automated…
Yasser Ismail
Hardcover
Model-Driven Development and Operation…
Dana Petcu, Peter Matthews, …
Hardcover
R1,339
Discovery Miles 13 390
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,527
Discovery Miles 65 270
|