![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers". They will add value to the business, improving the information security stance of organisations.
In this book, a programming model is developed that addresses the fundamental issues of 'large-scale programming'. The approach unifies several concepts from database theory, object-oriented programming and designs of reactive systems. The model and the associated theory has been christened "Seuss." The major goal of Seuss is to simplify multiprogramming. To this end, the concern of concurrent implementation is separated from the core program design problem. A program execution is understood as a single thread of control - sequential executions of actions that are chosen according to some scheduling policy. As a consequence, it is possible to reason about the properties of a program from its single execution thread.
This book covers the entire spectrum of multicasting on the Internet from link- to application-layer issues, including multicasting in broadcast and non-broadcast links, multicast routing, reliable and real-time multicast transport, group membership and total ordering in multicast groups. In-depth consideration is given to describing IP multicast routing protocols, such as, DVMRP, MOSPF, PIM and CBT, quality of service issues in network-layer using RSVP and ST-2, as well as the relationship between ATM and IP multicast. These discussions include coverage of key concepts using illustrative diagrams and various real-world applications. The protocols and the architecture of MBone are described, real-time multicast transport issues are addressed and various reliable multicast transport protocols are compared both conceptually and analytically. Also included is a discussion of video multicast and other cutting-edge research on multicast with an assessment of their potential impact on future internetworks.Multicasting on the Internet and Its Applications is an invaluable reference work for networking professionals and researchers, network software developers, information technology managers and graduate students.
Rutgers University launched WINLAB in 1989, just as the communications industry, the Federal government, and the financial community in the United States, were waking up to the growing public appetite for wireless communications and to the shortage of technology to feed it. The secret was already out in Europe, where no fewer than three new cordless and cellular systems were progressing from drawing board to laboratory to factory to consumers. In July 1989, the FCC held a well-attended tutorial that turned into a debate over whether second generation British or Swedish technology held the key to mass-market personal communications. Many in the audience wondered whether United States technology was out of the picture. Technology uncertainties are more acute in wireless communications than in any other information service. For example multi-gigabit optical fiber communications have followed an orderly progression from basic science leading to technology, which in turn stimulated standards, and then commercial products. Eventually applications will be found and industry and society at large will reap the benefits. By contrast, the applications of wireless communications are apparent to an eager public. A large market exists but is held in check by a shortage of capacity. The demand has led the cellular industry to formulate standards for advanced systems before the technology is in place to implement them. Everyone holds their breath waiting to observe performance of the first products. Gaps in basic science add to the uncertainty and forestall the resolution of technological debates.
This book constitutes the proceedings of the 13th Pacific Rim Conference on Multimedia, held in Singapore during December 4-6, 2012. The 59 revised full papers presented were carefully reviewed and selected from 106 submissions for the main conference and are accompanied by 23 presentations of 4 special sessions. The papers are organized in topical sections on multimedia content analysis, image and video processing, video coding and multimedia information processing, image/video processing and analysis, video coding and multimedia system, advanced image and video coding, cross media learning with structural priors, as well as efficient multimedia analysis and utilization.
This book constitutes the thoroughly reviewed post-proceedings of the 8th International Workshop on Argumentation in Multi-Agent Systems, ArgMas 2011, held in Taipei, Taiwan in May 2011 in association with the 10th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2011). The 8 revised full papers taken from ArgMAS 2011. Also included are 5 invited papers based on presentations on argumentation at the AAMAS 2011 main conference. All together the 13 papers included in the book give a representative overview on current research on argumentation in multi-agent systems. The papers are listed alphabetically by first author within three thematic topics: foundations and theory; argumentation and dialogue; and applications.
This book constitutes the refereed proceedings of the 18th International Conference on Knowledge Engineering and Knowledge Management, EKAW 2012, held in Galway City, Ireland, in October 2012. The 44 revised full papers were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on knowledge extraction and enrichment, natural language processing, linked data, ontology engineering and evaluation, social and cognitive aspects of knowledge representation, application of knowledge engineering, and demonstrations.
This book constitutes the refereed proceedings of the 11th International Conference on Service-Oriented Computing, ICSOC 2012, held in Berlin, Germany, in December 2013. The 29 full papers and 27 short papers presented were carefully reviewed and selected from 205 submissions. The papers are organized in topical sections on service engineering, service operations and management; services in the cloud; and service applications and implementations.
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.
This book constitutes the refereed proceedings of the First International Conference, TPNC 2012, held in Tarragona, Spain, in October 2012. The 12 revised full papers presented together with 6 invited talks were carefully reviewed and selected from 34 submissions. The papers are organized in topical sections on nature-inspired models of computation; synthesizing nature by means of computation; nature-inspired materials; and information processing in nature.
The subject of error-control coding bridges several disciplines, in particular mathematics, electrical engineering and computer science. The theory of error-control codes is often described abstractly in mathematical terms only, for the benefit of other coding specialists. Such a theoretical approach to coding makes it difficult for engineers to understand the underlying concepts of error correction, the design of digital error-control systems, and the quantitative behavior of such systems. In this book only a minimal amount of mathematics is introduced in order to describe the many, sometimes mathematical, aspects of error-control coding. The concepts of error correction and detection are in many cases sufficiently straightforward to avoid highly theoretical algebraic constructions. The reader will find that the primary emphasis of the book is on practical matters, not on theoretical problems. In fact, much of the material covered is summarized by examples of real developments, and almost all of the error-correction and detection codes introduced are attached to related practical applications.Error-Control Coding for Data Networks takes a structured approach to channel-coding, starting with the basic coding concepts and working gradually towards the most sophisticated coding systems. The most popular applications are described throughout the book. These applications include the channel-coding techniques used in mobile communication systems, such as: the global system for mobile communications (GSM) and the code-division multiple-access (CDMA) system, coding schemes for High-Definition TeleVision (HDTV) system, the Compact Disk (CD), and Digital Video Disk (DVD), as well as the error-control protocols for the data-link layers of networks, and much more. The book is compiled carefully to bring engineers, coding specialists, and students up to date in the important modern coding technologies. Both electrical engineering students and communication engineers will benefit from the information in this largely self-contained text on error-control system engineering.
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.
FIGURE 18.13e. Detector Output. ..................................................................... 618 FIGURE 18.14a. WDM Energy Distrubution into the Fiber ........................... 619 FIGURE 18.14b. Fiber Loss for the WDM Band .............................................. 619 FIGURE 18.14c. Fiber Group Delay Distribution ............................................ 619 FIGURE 18.14d. Receive Energy Distribution ................................................. 619 FIGURE 18.15a. Channell Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15b. Channel 2 Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15c. Channell System Output at Detector ................................. 621 FIGURE 18.15d. Channel 2 System Output at Detector ................................. 621 PREFACE The emerging networks in our society will touch upon the life of everyone. These networks have started to bring about an immense information revolution. The revolution within our intellectual life will be similar to the materialistic revolution that followed the invention of the steam and the internal combustion engines. From the perspective of the 1980s, the information networks are indeed evolving and their influence can only be gradual. However, the strides of progress are accelerating in the 1990s. Networks in our society offer the most candid area of convergence for the computer and the communication technologies. The two technologies are mature in their own right. However, there are a few major factors that prevent network engineers from constructing modern communication systems from components borrowed from each of these two technologies: * Major innovations are happening. * Specialized components evolve in synergistic patterns. * New technologies emerge. * Inquisitive minds cross disciplinary barriers.
This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.
This book constitutes the refereed proceedings of the Chinese Conference on Pattern Recognition, CCPR 2012, held in Beijing, China, in September 2012. The 82 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on pattern recognition theory; computer vision; biometric recognition; medical imaging; image and video analysis; document analysis; speech processing; natural language processing and information retrieval.
This book constitutes the refereed proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2012, held in Toronto, Canada, in October 2012. The 21 full papers and 10 brief announcements presented in this volume were carefully reviewed and selected from 75 submissions. The conference provides a wide spectrum of topics, covered in the following tracks: self-stabilization, ad-hoc and sensor networks, fault-tolerance and dependable systems, safety and security, cloud computing, formal methods, social networks, peer-to-peer, self-organizing and autonomic systems.
This book constitutes the refereed proceedings of the 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria, September 23-26, 2012. The 29 revised papers presented together with 4 invited talks and 7 poster papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on MPI implementation techniques and issues; benchmarking and performance analysis; programming models and new architectures; run-time support; fault-tolerance; message-passing algorithms; message-passing applications; IMUDI, improving MPI user and developer interaction.
This book constitutes the refereed conference proceedings of the 9th International Conference on Advances in Computer Entertainment, ACE 2012, held in Kathmandu, Nepal, in November 2012. The 10 full paper and 19 short papers presented together with 5 papers from the special track Arts and Culture and 35 extended abstracts were carefully reviewed and selected from a total of 140 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including computer science, design, arts, sociology, anthropology, psychology, and marketing. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.
In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.
Broadband communications is widely recognized as one of the key technologies for building the next generation global network infrastructure to support ever-increasing multimedia applications. This book contains a collection of timely leading-edge research papers that address some of the important issues of providing such a broadband network infrastructure. Broadband Communications represents the selected proceedings of the Fifth International Conference on Broadband Communications, sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in November 1999. The book is organized according to the eighteen technical sessions of the conference. The topics covered include internet services, traffic modeling, internet traffic control, performance evaluation, billing, pricing, admission policy, mobile network protocols, TCP/IP performance, mobile network performance, bandwidth allocation, switching systems, traffic flow control, routing, congestion and admission control, multicast protocols, network management, and quality of service. It will serve as an essential reference for computer scientists and practitioners.
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Energy Efficient Data Centers (E2DC 2012) held in Madrid, Spain, in May 2012. The 13 revised full papers presented were carefully selected from 32 submissions. The papers cover topics from information and communication technologies of green data centers to business models and GreenSLA solutions. The first section presents contributions in form of position and short papers, related to various European projects. The other two sections comprise papers with more in-depth technical details. The topics covered include energy-efficient data center management and service delivery as well as energy monitoring and optimization techniques for data centers.
This book constitutes the refereed proceedings of the 13th International Conference on Engineering Applications of Neural Networks, EANN 2012, held in London, UK, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of neural networks and other computational intelligence approaches to intelligent transport, environmental engineering, computer security, civil engineering, financial forecasting, virtual learning environments, language interpretation, bioinformatics and general engineering.
This book constitutes the thoroughly refereed proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis, ATVA 2012, held at Thiruvananthapuram, Kerala, India, in October 2012. The 25 regular papers, 3 invited papers and 4 tool papers presented were carefully selected from numerous submissions. Conference papers are organized in 9 technical sessions, covering the topics of automata theory, logics and proofs, model checking, software verification, synthesis, verification and parallelism, probabilistic verification, constraint solving and applications, and probabilistic systems.
Three speakers at the Second Workshop on Network Management and Control nostalgically remembered the INTEROP Conference at which SNMP was able to interface even to CD players and toasters. We agreed this was indeed a major step forward in standards, but wondered if anyone noticed whether the toast was burned, let alone, would want to eat it. The assurance of the correct operation of practical systems under difficult environments emerged as the dominant theme of the workshop with growth, interoperability, performance, and scalability as the primary sub-themes. Perhaps this thrust is un surprising, since about half the 100 or so attendees were from industry, with a strong contingency of users. Indeed the technical program co-chairs, Shivendra Panwar of Polytechnic and Walter Johnston of NYNEX, took as their assignment the coverage of real problems and opportunities in industry. Nevertheless we take it as a real indication of progress in the field that the community is beginning to take for granted the availability of standards and even the ability to detect physical, link, and network-level faults and is now expecting diagnostics at higher levels as well as system-wide solutions. |
You may like...
Full-Duplex Wireless Communications…
Tho Le-Ngoc, Ahmed Masmoudi
Hardcover
R3,731
Discovery Miles 37 310
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Robust Resource Allocation in Future…
Saeedeh Parsaeefard, Ahmad Reza Sharafat, …
Hardcover
R4,326
Discovery Miles 43 260
Cooperative Communications and…
Y -W Peter Hong, Wan-Jen Huang, …
Hardcover
R4,237
Discovery Miles 42 370
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, …
Hardcover
R2,017
Discovery Miles 20 170
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
|