0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (692)
  • R250 - R500 (2,420)
  • R500+ (12,433)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R4,420 Discovery Miles 44 200 Ships in 18 - 22 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Methodologies and Application Issues of Contemporary Computing Framework (Hardcover, 1st ed. 2018): Jyotsna Kumar Mandal,... Methodologies and Application Issues of Contemporary Computing Framework (Hardcover, 1st ed. 2018)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R2,656 Discovery Miles 26 560 Ships in 18 - 22 working days

This book brings together the diversified areas of contemporary computing frameworks in the field of Computer Science, Engineering and Electronic Science. It focuses on various techniques and applications pertaining to cloud overhead, cloud infrastructure, high speed VLSI circuits, virtual machines, wireless and sensor networks, clustering and extraction of information from images and analysis of e-mail texts. The state-of-the-art methodologies and techniques are addressed in chapters presenting various proposals for enhanced outcomes and performances. The techniques discussed are useful for young researchers, budding engineers and industry professionals for applications in their respective fields.

Artificial Intelligence in Theory and Practice III - Third IFIP TC 12 International Conference on Artificial Intelligence, IFIP... Artificial Intelligence in Theory and Practice III - Third IFIP TC 12 International Conference on Artificial Intelligence, IFIP AI 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Max Bramer
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

The papers in this volume comprise the refereed proceedings of the conference Arti- cial Intelligence in Theory and Practice (IFIP AI 2010), which formed part of the 21st World Computer Congress of IFIP, the International Federation for Information Pr- essing (WCC-2010), in Brisbane, Australia in September 2010. The conference was organized by the IFIP Technical Committee on Artificial Int- ligence (Technical Committee 12) and its Working Group 12.5 (Artificial Intelligence Applications). All papers were reviewed by at least two members of our Program Committee. - nal decisions were made by the Executive Program Committee, which comprised John Debenham (University of Technology, Sydney, Australia), Ilias Maglogiannis (University of Central Greece, Lamia, Greece), Eunika Mercier-Laurent (KIM, France) and myself. The best papers were selected for the conference, either as long papers (maximum 10 pages) or as short papers (maximum 5 pages) and are included in this volume. The international nature of IFIP is amply reflected in the large number of countries represented here. I should like to thank the Conference Chair, Tharam Dillon, for all his efforts and the members of our Program Committee for reviewing papers under a very tight de- line.

There's a War Going On But No One Can See It (Paperback): Huib Modderkolk There's a War Going On But No One Can See It (Paperback)
Huib Modderkolk
R285 R259 Discovery Miles 2 590 Save R26 (9%) Ships in 9 - 17 working days

'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.

Card Sorting - Designing Usable Categories (Paperback): Donna Spencer Card Sorting - Designing Usable Categories (Paperback)
Donna Spencer
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days
Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016): Georgi M. Dimirovski Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016)
Georgi M. Dimirovski
R4,216 Discovery Miles 42 160 Ships in 18 - 22 working days

This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity and survivability at the same time retaining desired performance quality. Applications in the individual chapters are drawn from: * the general implementation of model-based diagnosis and systems engineering in medical technology, in communication, and in power and airport networks; * the creation of biologically inspired control brains and safety-critical human-machine systems, * process-industrial uses; * biped robots; * large space structures and unmanned aerial vehicles; and * precision servomechanisms and other advanced technologies. Complex Systems provides researchers from engineering, applied mathematics and computer science backgrounds with innovative theoretical and practical insights into the state-of-the-art of complex networks and systems research. It employs physical implementations and extensive computer simulations. Graduate students specializing in complex-systems

Brad Friedman on Digital Marketing - Doing Social Media Right, When You Don't Have the Time and Don't Want to Get in... Brad Friedman on Digital Marketing - Doing Social Media Right, When You Don't Have the Time and Don't Want to Get in Trouble (Hardcover)
Brad Friedman
R638 Discovery Miles 6 380 Ships in 18 - 22 working days
Cryptocurrency - How to Become Successful Trading Cryptocurrency (Hardcover): Jared Snyder Cryptocurrency - How to Become Successful Trading Cryptocurrency (Hardcover)
Jared Snyder
R555 R504 Discovery Miles 5 040 Save R51 (9%) Ships in 18 - 22 working days
Safety Message Broadcast in Vehicular Networks (Hardcover, 1st ed. 2017): Yuanguo Bi, Haibo Zhou, Weihua Zhuang, Hai Zhao Safety Message Broadcast in Vehicular Networks (Hardcover, 1st ed. 2017)
Yuanguo Bi, Haibo Zhou, Weihua Zhuang, Hai Zhao
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature.A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle-to-infrastructure communications.This book offers useful insights into protocol design and inspires a new line of thinking in performance improvements for safety applications in vehicular networks. It is a valuable resource for professionals, researchers, or advanced-level students working in vehicular networks or quality of service.

EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed. 2019)
Angelica Reyes-Munoz, Ping Zheng, David Crawford, Victor Callaghan
R4,068 Discovery Miles 40 680 Ships in 18 - 22 working days

This book presents the proceedings of the 1st EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE 2017), which took place at Canterbury Christ Church University on September 11-12, 2017. The central theme of the conference is creativity and innovation, especially in relation to technology, business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

Fuzzy Logic and the Semantic Web, Volume 1 (Hardcover): Elie Sanchez Fuzzy Logic and the Semantic Web, Volume 1 (Hardcover)
Elie Sanchez
R4,158 Discovery Miles 41 580 Ships in 10 - 15 working days

These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic.


This book, the first in the new series Capturing Intelligence, shows the positive role Fuzzy Logic, and more generally Soft Computing, can play in the development of the Semantic Web, filling a gap and facing a new challenge. It covers concepts, tools, techniques and applications exhibiting the usefulness, and the necessity, for using Fuzzy Logic in the Semantic Web. It finally opens the road to new systems with a high Web IQ.


Most of today's Web content is suitable for human consumption. The Semantic Web is presented as an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. For example, within the Semantic Web, computers will understand the meaning of semantic data on a web page by following links to specified ontologies. But while the Semantic Web vision and research attracts attention, as long as it will be used two-valued-based logical methods no progress will be expected in handling ill-structured, uncertain or imprecise information encountered in real world knowledge. Fuzzy Logic and associated concepts and techniques (more generally, Soft Computing), has certainly a positive role to play in the development of the Semantic Web. Fuzzy Logic will not supposed to be the basis for the Semantic Web but its related concepts and techniques will certainly reinforce the systems classically developed within W3C.


In fact, Fuzzy Logic cannot be ignored in order to bridge the gap between human-understandable soft logic and machine-readable hard logic. None of the usual logical requirements can be guaranteed: there is no centrally defined format for data, no guarantee of truth for assertions made, no guarantee of consistency. To support these arguments, this book shows how components of the Semantic Web (like XML, RDF, Description Logics, Conceptual Graphs, Ontologies) can be covered, with in each case a Fuzzy Logic focus.


Key features.


- First volume to focus on the growing connections between Fuzzy Logic and the Semantic Web.
- Keynote chapter by Lotfi Zadeh.
- The Semantic Web is presently expected to be a major field of applications of Fuzzy Logic.
- It fills a gap and faces a new challenge in the development of the Semantic Web.
- It opens the road to new systems with a high Web IQ.
- Contributed chapters by Fuzzy Logic leading experts.
- First volume to focus on the growing connections between Fuzzy Logic and the Semantic Web.
- Keynote chapter by Lotfi Zadeh.
- The Semantic Web is presently expected to be a major field of applications of Fuzzy Logic.
- It fills a gap and faces a new challenge in the development of the Semantic Web.
- It opens the road to new systems with a high Web IQ.
- Contributed chapters by Fuzzy Logic leading experts.

Information Sciences and Systems 2014 - Proceedings of the 29th International Symposium on Computer and Information Sciences... Information Sciences and Systems 2014 - Proceedings of the 29th International Symposium on Computer and Information Sciences (Hardcover)
Tadeusz Czachorski, Erol Gelenbe, Ricardo Lent
R4,110 R3,557 Discovery Miles 35 570 Save R553 (13%) Ships in 10 - 15 working days

Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27-8, 2014.

Cross-Layer Design in Optical Networks (Hardcover, 2013 ed.): Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava... Cross-Layer Design in Optical Networks (Hardcover, 2013 ed.)
Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava Vijaya Saradhi
R5,378 R4,787 Discovery Miles 47 870 Save R591 (11%) Ships in 10 - 15 working days

This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware design. Contributors captures both the physical-layer-aware network design as well as the latest advances in service-layer-aware network design. Treatment of topics such as, optical transmissions which are prone to signal impairments, dense packing of wavelengths, dispersion, crosstalk, etc., as well as how to design the network to mitigate such impairments, are all covered.

Internet Multimedia Communications Using SIP - A Modern Approach Including Java (R) Practice (Hardcover): Rogelio Martinez Perea Internet Multimedia Communications Using SIP - A Modern Approach Including Java (R) Practice (Hardcover)
Rogelio Martinez Perea
R1,836 Discovery Miles 18 360 Ships in 10 - 15 working days

Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other, see each other, work collaboratively or send messages in real time. Internet telephony and, in general, Internet multimedia, is the new revolution today and SIP is the key protocol which allows this revolution to grow.
The book explains, in tutorial fashion, the underlying technologies that enable real-time IP multimedia communication services in the Internet (voice, video, presence, instant messaging, online picture sharing, white-boarding, etc). Focus is on session initiation protocol (SIP) but also covers session description protocol (SDP), Real-time transport protocol (RTP), and message session relay protocol (MSRP). In addition, it will also touch on other application-related protocols and refer to the latest research work in IETF and 3GPP about these topics. (3GPP stands for "third-generation partnership project" which is a collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA (China), ATIS (North America) and TTA (South Korea).) The book includes discussion of leading edge theory (which is key to really understanding the technology) accompanied by Java examples that illustrate the theoretical concepts.
Throughout the book, in addition to the code snippets, the reader is guided to build a simple but functional IP soft-phone therefore demonstrating the theory with practical examples.
This book covers IP multimedia from both a theoretical and practical point of view focusing on letting the reader understand the concepts and put them into practice using Java. It includes lots of drawings, protocol diagrams, UML sequence diagrams and code snippets that allow the reader to rapidly understand the concepts.

KEY FEATURES
* Focus on HOW multimedia communications over the Internet works to allow readers to really understand and implement the technology
* Explains how SIP works, including many programming examples so the reader can understand abstract concepts like SIP dialogs, SIP transactions, etc.
* It is not focused on just VoIP. It looks At a wide array of enhanced communication services related to SIP enabling the reader put this technology into practice.
* Includes nearly 100 references to the latest standards and working group activities in the IETF, bringing the reader completely up to date.
* Provides a step-by-step tutorial on how to build a basic, though functional, IP soft-phone allowing the reader to put concepts into practice.
* For advanced readers, the book also explains how to build a SIP proxy and a SIP registrar to enhance one's expertise and marketability in this fast moving area.

Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016): Michael Workman Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016)
Michael Workman
R4,138 R3,337 Discovery Miles 33 370 Save R801 (19%) Ships in 10 - 15 working days

This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.

Human Computer Interaction Research in Web Design and Evaluation (Hardcover): Human Computer Interaction Research in Web Design and Evaluation (Hardcover)
R2,493 Discovery Miles 24 930 Ships in 18 - 22 working days

Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense. ""Human Computer Interaction Research in Web Design and Evaluation"" is a comprehensive book on HCI and Web design that focuses on various areas of research including theories, analysis, design, and evaluation. This book not only features the human aspect of Web design, but also highlights the social and cultural issues in designing for a wider audience.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure - Emerging Research and Opportunities (Hardcover): T.... Detection and Mitigation of Insider Attacks in a Cloud Infrastructure - Emerging Research and Opportunities (Hardcover)
T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, B. Thirumala Rao
R4,070 Discovery Miles 40 700 Ships in 18 - 22 working days

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

Web Form Design - Filling in the Blanks (Paperback): Luke Wroblewski Web Form Design - Filling in the Blanks (Paperback)
Luke Wroblewski
R1,392 Discovery Miles 13 920 Ships in 18 - 22 working days
Mathematical Foundation of the General Theory of Relativity (Hardcover): Albert Einstein Mathematical Foundation of the General Theory of Relativity (Hardcover)
Albert Einstein
R1,754 R1,412 Discovery Miles 14 120 Save R342 (19%) Ships in 18 - 22 working days
IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

The Thousand Faces of Virtual Reality (Hardcover): Cecilia Sik Lanyi The Thousand Faces of Virtual Reality (Hardcover)
Cecilia Sik Lanyi
R3,094 Discovery Miles 30 940 Ships in 18 - 22 working days
Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires,... Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires, Argentina, November 3-5, 2010, Proceedings (Hardcover, 2010 Ed.)
Wojciech Cellary, Elsa Estevez
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.

Dividend Investing For Beginners - Learn The Basics Of Dividend Investing And Strategies In 5 Days And Learn It Well... Dividend Investing For Beginners - Learn The Basics Of Dividend Investing And Strategies In 5 Days And Learn It Well (Hardcover)
Michael Ezeanaka
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
Cloud Data Management (Hardcover, 2014 ed.): Liang Zhao, Sherif Sakr, Anna Liu, Athman Bouguettaya Cloud Data Management (Hardcover, 2014 ed.)
Liang Zhao, Sherif Sakr, Anna Liu, Athman Bouguettaya
R3,368 R1,868 Discovery Miles 18 680 Save R1,500 (45%) Ships in 10 - 15 working days

In practice, the design and architecture of a cloud varies among cloud providers. We present a generic evaluation framework for the performance, availability and reliability characteristics of various cloud platforms. We describe a generic benchmark architecture for cloud databases, specifically NoSQL database as a service. It measures the performance of replication delay and monetary cost.

Service Level Agreements (SLA) represent the contract which captures the agreed upon guarantees between a service provider and its customers. The specifications of existing service level agreements (SLA) for cloud services are not designed to flexibly handle even relatively straightforward performance and technical requirements of consumer applications. We present a novel approach for SLA-based management of cloud-hosted databases from the consumer perspective and an end-to-end framework for consumer-centric SLA management of cloud-hosted databases. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the monetary cost of the allocated computing resources. In this framework, the SLA of the consumer applications are declaratively defined in terms of goals which are subjected to a number of constraints that are specific to the application requirements. The framework continuously monitors the application-defined SLA and automatically triggers the execution of necessary corrective actions (scaling out/in the database tier) when required. The framework is database platform-agnostic, uses virtualization-based database replication mechanisms and requires zero source code changes of the cloud-hosted software applications.

Cryptocurrency - 50 Expert Secrets for Beginners You Need to Know When It Comes to Investing in Bitcoing, Ethereum AND... Cryptocurrency - 50 Expert Secrets for Beginners You Need to Know When It Comes to Investing in Bitcoing, Ethereum AND LIitecoin (Hardcover)
Jared Snyder
R556 R505 Discovery Miles 5 050 Save R51 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sonic Thunder - A discussion of natural…
W R Matson Paperback R750 Discovery Miles 7 500
Semantic-Enabled Advancements on the Web…
Amit P. Sheth Hardcover R4,810 Discovery Miles 48 100
Microfluidics - Modeling, Mechanics and…
Bastian E. Rapp Paperback R6,385 Discovery Miles 63 850
Existence Theory for Generalized…
Dominic Breit Paperback R2,385 R2,253 Discovery Miles 22 530
Probability and Stochastic Processes - A…
Roy D. Yates, David J. Goodman Paperback R1,391 Discovery Miles 13 910
Pearson Edexcel AS and A level…
Paperback  (1)
R273 Discovery Miles 2 730
Control and Filtering for Semi-Markovian…
Fanbiao Li, Peng Shi, … Hardcover R3,316 Discovery Miles 33 160
Modeling Approaches and Computational…
Shankar Subramaniam, S. Balachandar Paperback R3,925 Discovery Miles 39 250
Convective Heat Transfer - Mathematical…
I. Pop, Derek B. Ingham Hardcover R6,743 Discovery Miles 67 430
Enneagram Test - The Ultimate Guide to…
Robert Leary Paperback R456 Discovery Miles 4 560

 

Partners