0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (82)
  • R500+ (1,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005): Achim Rettberg,... From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Achim Rettberg, Mauro C. Zanella, Franz J. Rammig
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase.

Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations.

To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality.

From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP).

The topics which have been chosen for this working conference are very timely: design methodology, modeling, specification, software synthesis, power management, formal verification, testing, network, communication systems, distributed control systems, resource management and special aspects in system design.

NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011, Proceedings (Paperback,... NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011, Proceedings (Paperback, Edition.)
Mihaela Bobaru, Klaus Havelund, Gerard Holzmann, Rajeev Joshi
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Symposium on NASA Formal Methods, NFM 2011, held in Pasadena, CA, USA, in April 2011.
The 26 revised full papers presented together with 12 tool papers, 3 invited talks, and 2 invited tutorials were carefully reviewed and selected from 141 submissions. The topics covered by NFM 2011 included but were not limited to: theorem proving, logic model checking, automated testing and simulation, model-based engineering, real-time and stochastic systems, SAT and SMT solvers, symbolic execution, abstraction and abstraction refinement, compositional verification techniques; static and dynamic analysis techniques, fault protection, cyber security, specification formalisms, requirements analysis, and applications of formal techniques.

Extreme Programming Pocket Guide (Paperback): Chromatic Extreme Programming Pocket Guide (Paperback)
Chromatic
R420 R383 Discovery Miles 3 830 Save R37 (9%) Ships in 18 - 22 working days

The Extreme Programming Pocket Guide covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. If you want to adopt XP in stages, the Extreme Programming Pocket Guide will help you choose what to apply and when. Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.

Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.

SIMD Programming Manual for Linux and Windows (Paperback, Softcover reprint of hardcover 1st ed. 2004): Paul Cockshott, Kenneth... SIMD Programming Manual for Linux and Windows (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Paul Cockshott, Kenneth Renfrew
R3,811 Discovery Miles 38 110 Ships in 18 - 22 working days

A number of widely used contemporary processors have instruction-set extensions for improved performance in multi-media applications. The aim is to allow operations to proceed on multiple pixels each clock cycle. Such instruction-sets have been incorporated both in specialist DSPchips such as the Texas C62xx (Texas Instruments, 1998) and in general purpose CPU chips like the Intel IA32 (Intel, 2000) or the AMD K6 (Advanced Micro Devices, 1999). These instruction-set extensions are typically based on the Single Instruc tion-stream Multiple Data-stream (SIMD) model in which a single instruction causes the same mathematical operation to be carried out on several operands, or pairs of operands, at the same time. The level or parallelism supported ranges from two floating point operations, at a time on the AMD K6 architecture to 16 byte operations at a time on the Intel P4 architecture. Whereas processor architectures are moving towards greater levels of parallelism, the most widely used programming languages such as C, Java and Delphi are structured around a model of computation in which operations takeplace on a single value at a time. This was appropriate when processors worked this way, but has become an impediment to programmers seeking to make use of the performance offered by multi-media instruction -sets. The introduction of SIMD instruction sets (Peleg et al."

Distributed Services with OpenAFS - for Enterprise and Education (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed Services with OpenAFS - for Enterprise and Education (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Franco Milicchio, Wolfgang Alexander Gehrke
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.

Reliable Distributed Systems - Technologies, Web Services, and Applications (Paperback, Softcover reprint of hardcover 1st ed.... Reliable Distributed Systems - Technologies, Web Services, and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Kenneth Birman
R2,357 Discovery Miles 23 570 Ships in 18 - 22 working days

Explains fault tolerance in clear terms, with concrete examples drawn from real-world settings
Highly practical focus aimed at building "mission-critical" networked applications that remain secure

Grid and Distributed Computing - International Conference, GDC 2009, Held as Part of the Future Generation Information... Grid and Distributed Computing - International Conference, GDC 2009, Held as Part of the Future Generation Information Technology Conferences, FGIT 2009, Jeju Island, Korea, December 10-12, 2009, Proceedings (Paperback, 2010 ed.)
Dominik Slezak, Tai-Hoon Kim, Stephen S.-T. Yau, Osvaldo Gervasi, Byeong Ho Kang
R1,395 Discovery Miles 13 950 Ships in 18 - 22 working days

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Architecting Dependable Systems VI (Paperback, 2009 ed.): Rogerio De Lemos, Jean-Charles Fabre, Cristina Gacek, Fabio Gadducci,... Architecting Dependable Systems VI (Paperback, 2009 ed.)
Rogerio De Lemos, Jean-Charles Fabre, Cristina Gacek, Fabio Gadducci, Maurice H. ter Beek
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

As software systems become increasingly ubiquitous, issues of dependability become ever more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability and security are addressed at the architectural level. This book has originated from an effort to bring together the research communities of software architectures, dependability and security.

This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2008), organized at the 2008 International Conference on Dependable Systems and Networks (DSN 2008), held in Anchorage, Alaska, USA, in June 2008, and the Third International Workshop on Views On Designing Complex Architectures (VODCA 2008) held in Bertinoro, Italy, in August 2008. It also contains invited papers written by recognized experts in the area. The 13 papers are organized in topical sections on dependable service-oriented architectures, fault-tolerance and system evaluation, and architecting security.

Web Content Caching and Distribution - Proceedings of the 8th International Workshop (Paperback, Softcover reprint of hardcover... Web Content Caching and Distribution - Proceedings of the 8th International Workshop (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Fred Douglis, Brian D Davison
R4,030 Discovery Miles 40 300 Ships in 18 - 22 working days

Web caching and content delivery technologies provide the infrastructure on which systems are built for the scalable distribution of information. This proceedings of the eighth annual workshop, captures a cross-section of the latest issues and techniques of interest to network architects and researchers in large-scale content delivery. Topics covered include the distribution of streaming multimedia, edge caching and computation, multicast, delivery of dynamic content, enterprise content delivery, streaming proxies and servers, content transcoding, replication and caching strategies, peer-to-peer content delivery, and Web prefetching.
Web Content Caching and Distribution encompasses all areas relating to the intersection of storage and networking for Internet content services. The book is divided into eight parts: mobility, applications, architectures, multimedia, customization, peer-to-peer, performance and measurement, and delta encoding.

Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009): George... Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009)
George Spanoudakis, Spyros Kokolakis
R4,041 Discovery Miles 40 410 Ships in 18 - 22 working days

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms.

An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems.

Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.

Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998): Jan Wikander, Bertil... Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998)
Jan Wikander, Bertil Svensson
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Real-Time Systems in Mechatronic Applications brings together in one place important contributions and up-to-date research results in this fast moving area. Real-Time Systems in Mechatronic Applications serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Computer-Supported Cooperative Work - Introduction to Distributed Applications (Paperback, Softcover reprint of hardcover 1st... Computer-Supported Cooperative Work - Introduction to Distributed Applications (Paperback, Softcover reprint of hardcover 1st ed. 2000)
Uwe M. Borghoff, Johann H. Schlichter
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

A detailed introduction to interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. The book is addressed to students of distributed systems, communications, information science and socio-organizational theory, as well as to users and developers of systems with group communication and cooperation as top priorities.

Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002): Robert Graybill, Rami Melhem Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Robert Graybill, Rami Melhem
R5,200 Discovery Miles 52 000 Ships in 18 - 22 working days

With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."

Trust in Technology: A Socio-Technical Perspective (Paperback, Softcover reprint of hardcover 1st ed. 2006): Karen Clarke,... Trust in Technology: A Socio-Technical Perspective (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Karen Clarke, Gillian Hardstone, Mark Rouncefield, Ian Sommerville
R2,643 Discovery Miles 26 430 Ships in 18 - 22 working days

Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.

Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed.... Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Messaoud Benantar
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.

Formal Models of Operating System Kernels (Paperback, Softcover reprint of hardcover 1st ed. 2007): Iain D. Craig Formal Models of Operating System Kernels (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Iain D. Craig
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

Operating systems kernels are central to the functioning of computers. Security of the overall system, as well as its reliability and responsiveness, depend upon the correct functioning of the kernel. This unique approach - presenting a formal specification of a kernel - starts with basic constructs and develops a set of kernels; proofs are included as part of the text.

Distributed Event-Based Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006): Gero Muhl, Ludger Fiege, Peter... Distributed Event-Based Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Gero Muhl, Ludger Fiege, Peter Pietzuch
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book provides an in-depth description of event-based systems, covering topics ranging from local event matching and distributed event forwarding algorithms, through a practical discussion of software engineering issues raised by the event-based style, to state-of-the-art research in event-based systems like composite event detection and security. The authors offer a comprehensive overview, and show the power of event-based architectures in modern system design, encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.

Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April... Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Paperback, 2008 ed.)
Weiming. Shen, Jianming Yong, Yun Yang, Jean-Paul A. Barthes, Junzhou Luo
R2,760 Discovery Miles 27 600 Ships in 18 - 22 working days

Design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple sophisticated commercial and non-commercial engine- ing tools such as CAD tools, modeling, simulation and optimization software, en- neering databases, and knowledge-based systems. Individuals or individual groups of multidisciplinary design teams usually work in parallel and independently with various engineering tools, which are located on different sites, often for quite a long period of time. At any moment, individual members may be working on different versions of a design or viewing the design from various perspectives, at different levels of details. In order to meet these requirements, it is necessary to have efficient comput- supported collaborative design systems. These systems should not only automate in- vidual tasks, in the manner of traditional computer-aided engineering tools, but also enable individual members to share information, collaborate, and coordinate their activities within the context of a design project. Based on close international collaboration between the University of Technology of Compiegne in France and the Institute of Computing Technology of the Chinese Ac- emy of Sciences in the early 1990s, a series of international workshops on CSCW in Design started in 1996. In order to facilitate the organization of these workshops, an International Working Group on CSCW in Design (CSCWD) was established and an International Steering Committee was formed in 1998. The series was converted to int- national conferences in 2000 building on the success of the four previous workshops."

Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.): Robert... Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.)
Robert Hirschfeld, Kim Rose
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves. One property of these systems is that their implementation is based onsmall but powerfulabstractions;examples include (amongst others) Squeak/Smalltalk, COLA, Klein/Self, PyPy/Python, Rubinius/Ruby, andLisp.Suchsystemsaretheenginesoftheirownreplacement, giving researchers and developers great power to experiment with, and explore future directions from within, their own small language kernels. S3 took place on May 15-16, 2008 at the Hasso-Plattner-Institute (HPI) in Potsdam, Germany. It was an exciting opportunity for researchers and prac- tioners interested in self-sustaining systems to meet and share their knowledge, experience, and ideas for future research and development. S3 provided an - portunity for a community to gather and discuss the need for self-sustainability in software systems, and to share and explore thoughts on why such systems are needed and how they can be created and deployed. Analogies were made, for example, with evolutionary cycles, and with urban design and the subsequent inevitable socially-driven change. TheS3participantsleftwithagreatersenseofcommunityandanenthusiasm for probing more deeply into this subject. We see the need for self-sustaining systems becoming critical not only to the developer's community, but to e- users in business, academia, learning and play, and so we hope that this S3 workshop will become the ?rst of many.

Middleware 2009 - ACM/IFIP/USENIX, 10th International Conference, Urbana, IL, USA, November 30 - December 4, 2009, Proceedings... Middleware 2009 - ACM/IFIP/USENIX, 10th International Conference, Urbana, IL, USA, November 30 - December 4, 2009, Proceedings (Paperback, 2009 ed.)
Valerie Issarny, Brian F. Cooper
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This edition marks the tenth Middleware conference. The ?rst conference was held in the Lake District of England in 1998, and its genesis re?ected a growing realization that middleware systems were a unique breed of distributed system requiring their own rigorous research and evaluation. Distributed systems had been around for decades, and the Middleware conference itself resulted from the combination of three previous conferences. But the attempt to build common platforms for many di?erent applications requireda unique combinationofhi- level abstraction and low-level optimization, and presented challenges di?erent from building a monolithic distributed system. Since that ?rst conference, the notion of what constitutes "middleware" has changed somewhat, and the focus of research papers has changed with it. The ?rst edition focused heavily on distributed objects as a metaphor for building systems, including six papers with "CORBA" or "ORB" in the title. In f- lowing years, the conference broadened to cover publish/subscribe messaging, peer-to-peer systems, distributed databases, Web services, and automated m- agement, among other topics. Innovative techniques and architectures surfaced in workshops, and expanded to become themes of the main conference, while changes in the industry and advances in other research areas helped to shape research agendas. This tenth edition includes papers on next-generation pl- forms (such as stream systems, pervasive systems and cloud systems), managing enterprise data centers, and platforms for building other platforms, among o- ers.

Advances in Information Technology - Third International Conference, IAIT 2009, Bangkok, Thailand, December 1-5, 2009,... Advances in Information Technology - Third International Conference, IAIT 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings (Paperback, 2009 ed.)
Borworn Papasratorn, Wichian Chutimaskul, Kriengkrai Porkaew, Vajirasak Vanijja
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days

At the School of Information Technology, KMUTT, we believe that information te- nology is the most important driver of economy and social development. IT can - able better productivity, as well as helping us to save resources. IT is giving rise to a new round of industrial and business revolution. We now can have products and s- vices that once were believed to be beyond reach. Without IT, it is impossible for people to realize their full potential. Businesses worldwide are harnessing the power of broadband communication, which will have a profound and constructive impact on the economic, social devel- ment, education, and almost all aspects of our life. This new era of unified commu- cation presents us with new challenges. This is why we should work together more closely to enhance the exchange of knowledge related to effective application of broadband communication and IT. It is my sincere hope that all contributions to the Third International Conference on Advances in Information Technology (IAIT 2009) will increase our understanding of how we can have effectively apply this emerging technology for the benefit of all people all around the world. I hope IAIT 2009 will also lead to more research that can contr- ute to a better methodology for IT applications in the era of unified communication. I am very grateful to all our keynotes speakers for coming all the way to Thailand.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.): Qingfeng Chen, Chengqi Zhang, Shichao... Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.)
Qingfeng Chen, Chengqi Zhang, Shichao Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e?orts of intruders, and has been widely discussed among - searchers in this ?eld. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS, CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as ?nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice, butthey alsoposeabigchallenge to protect the information transmitted over the open network from malicious attack

Microinteractions: Full Color Edition (Paperback, Full Color Ed): Dan Saffer Microinteractions: Full Color Edition (Paperback, Full Color Ed)
Dan Saffer
R862 R741 Discovery Miles 7 410 Save R121 (14%) Ships in 18 - 22 working days

It's the little things that turn a good digital product into a great one. With this full color practical book, you'll learn how to design effective microinteractions: the small details that exist inside and around features. How can users change a setting? How do they turn on mute, or know they have a new email message? Through vivid, real-world examples from today's devices and applications, author Dan Saffer walks you through a microinteraction's essential parts, then shows you how to use them in a mobile app, a web widget, and an appliance. You'll quickly discover how microinteractions can change a product from one that's tolerated into one that's treasured. Explore a microinteraction's structure: triggers, rules, feedback, modes, and loops Learn the types of triggers that initiate a microinteraction Create simple rules that define how your microinteraction can be used Help users understand the rules with feedback, using graphics, sounds, and vibrations Use modes to let users set preferences or modify a microinteraction Extend a microinteraction's life with loops, such as "Get data every 30 seconds"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Networknomicon, or SNMP Mastery
Michael W Lucas, Abdul Alhazred Hardcover R1,436 R1,247 Discovery Miles 12 470
uC/OS-III - The Real-Time Kernel
Jean J. Labrosse Hardcover R1,809 Discovery Miles 18 090
OS X for Hackers at Heart
Bruce Potter, Chris Hurley, … Paperback R1,013 Discovery Miles 10 130
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse Hardcover R1,800 Discovery Miles 18 000
How to Cheat at Managing Windows Server…
B. Barber Paperback R879 R734 Discovery Miles 7 340
Coding Basics for Beginners - The Smart…
Jefferson Sandyman Hardcover R588 Discovery Miles 5 880
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi Hardcover R2,482 Discovery Miles 24 820
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
HCI Beyond the GUI - Design for Haptic…
Philip Kortum Paperback R1,247 Discovery Miles 12 470

 

Partners