![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. "Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.
This updated edition offers an indispensable exposition on real-time computing, with particular emphasis on predictable scheduling algorithms. It introduces the fundamental concepts of real-time computing, demonstrates the most significant results in the field, and provides the essential methodologies for designing predictable computing systems used to support time-critical control applications. Along with an in-depth guide to the available approaches for the implementation and analysis of real-time applications, this revised edition contains a close examination of recent developments in real-time systems, including limited preemptive scheduling, resource reservation techniques, overload handling algorithms, and adaptive scheduling techniques. This volume serves as a fundamental advanced-level textbook. Each chapter provides basic concepts, which are followed by algorithms, illustrated with concrete examples, figures and tables. Exercises and solutions are provided to enhance self-study, making this an excellent reference for those interested in real-time computing for designing and/or developing predictable control applications.
This book constitutes Part II of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.
Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: * sensor node design; * embedded software design; * routing algorithms; * sink node positioning; * co-existence with other wireless systems; * data fusion; * security; * indoor location tracking; * integrating with radio-frequency identification; and * Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.
Communications: Wireless in Developing Countries and Networks of the Future The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organized by the International Federation for Information Processing (IFIP): the Third IFIP TC 6 Int- national Conference on Wireless Communications and Information Technology for Developing Countries (WCITD 2010) and the IFIP TC 6 International Network of the Future Conference (NF 2010). The main objective of these two IFIP conferences on communications is to provide a platform for the exchange of recent and original c- tributions in wireless networks in developing countries and networks of the future. There are many exiting trends and developments in the communications industry, several of which are related to advances in wireless networks, and next-generation Internet. It is commonly believed in the communications industry that a new gene- tion should appear in the next ten years. Yet there are a number of issues that are being worked on in various industry research and development labs and universities towards enabling wireless high-speed networks, virtualization techniques, smart n- works, high-level security schemes, etc. We would like to thank the members of the Program Committees and the external reviewers and we hope these proceedings will be very useful to all researchers int- ested in the fields of wireless networks and future network technologies.
The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds. The book by Baldoni and Chockler analyzes the structure of software infrastructures found in the financial domain, their vulnerabilities to cyber attacks and the existing protection mechanisms. It then shows the advantages of sharing information among financial players in order to detect and quickly react to cyber attacks. Various aspects associated with information sharing are investigated from the organizational, cultural and legislative perspectives. The presentation is organized in two parts: Part I explores general issues associated with information sharing in the financial sector and is intended to set the stage for the vertical IT middleware solution proposed in Part II. Nonetheless, it is self-contained and details a survey of various types of critical infrastructure along with their vulnerability analysis, which has not yet appeared in a textbook-style publication elsewhere. Part II then presents the CoMiFin middleware for collaborative protection of the financial infrastructure. The material is presented in an accessible style and does not require specific prerequisites. It appeals to both researchers in the areas of security, distributed systems, and event processing working on new protection mechanisms, and practitioners looking for a state-of-the-art middleware technology to enhance the security of their critical infrastructures in e.g. banking, military, and other highly sensitive applications. The latter group will especially appreciate the concrete usage scenarios included.
This book presents an in-depth treatment of routing and wavelength assignment for optical networks, and focuses specifically on quality-of-service and fault resiliency issues. It reports on novel approaches for the development of routing and wavelength assignment schemes for fault-resilient optical networks, which improve their performance in terms of signal quality, call blocking, congestion level and reliability, without a substantial increase in network setup cost. The book first presents a solution for reducing the effect of the wavelength continuity constraint during the routing and wavelength assignment phase. Further, it reports on an approach allowing the incorporation of a traffic grooming mechanism with routing and wavelength assignment to enhance the effective channel utilization of a given capacity optical network using fewer electrical-optical-electrical conversions. As a third step, it addresses a quality of service provision scheme for wavelength-division multiplexing (WDM)-based optical networks. Lastly, the book describes the inclusion of a tree-based fault resilience scheme in priority-based dispersion-reduced wavelength assignment schemes for the purpose of improving network reliability, while maintaining a better utilization of network resources. Mainly intended for graduate students and researchers, the book provides them with extensive information on both fundamental and advanced technologies for routing and wavelength assignment in optical networks. The topics covered will also be of interest to network planners and designers.
This book constitutes the refereed proceedings of the 12th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2011, held in Sao Paulo, Brazil, in October 2011. The 61 revised papers presented were carefully selected from numerous submissions. They provide a comprehensive overview of recent advances in various collaborative network (CN) domains and their applications with a particular focus on adaptation of the networks and their value creation, specifically emphasizing topics related to evolution from social networking to collaborative networks; social capital; value chains; co-creation of complex products; performance management; behavioral aspects in collaborative networks; collaborative networks planning and modeling; benefit analysis and sustainability issues, as well as including important technical and scientific challenges in applying CNs to areas such as advanced logistics networks, business process modeling, service orientation, and other emerging application domains such as ageing, tourism, crisis, and emergency scenarios.
"Designing for Network and Service Continuity in Wireless Mesh Networks" describes performance predictability of the new wireless mesh network paradigm, and describes considerations in designing networks from the perspective of survivability and service continuity metrics. The work provides design insights for network design researchers and industry professionals. It includes designs for new mesh networks and extensions of existing networks with predictable performance.
Reading without meditation is sterile; meditation without reading is liable to error; prayer without meditation is lukewarm; meditation without prayer is unfruitful; prayer, when it is fervent, wins contemplation, but to obtain contemplation without prayer would be rare, even miraculous. Bernhard de Clairvaux (12th century) NobodycandenythatIP-basedtra?chasinvadedourdailylifeinmanyways and no one can escape from its di?erent forms of appearance. However, most people are not aware of this fact. From the usage of mobile phones - either as simple telephone or for data transmissions - over the new form of telephone service Voice over IP (VoIP), up to the widely used Internet at the users own PC, in all instances the transmission of the information, encoded in a digital form, relies on the Internet Protocol (IP). So, we should take a brief glimpse at this protocol and its constant companions such as TCP and UDP, which have revolutionized the communication system over the past 20 years. The communication network has experienced a fundamental change, which was dominated up to end of the eighties of the last century by voice appli- tion.Butfromthemiddleoftheninetieswehaveobservedadecisivemigration in the data transmission. If the devoted reader of this monograph reads the title 'IP tra?c theory and performance', she/he may ask, why do we have to be concerned with mod- ing IP tra?c, and why do we have to consider and get to know new concepts.
BrunoBuchberger This book is a synopsis of basic and applied research done at the various re search institutions of the Softwarepark Hagenberg in Austria. Starting with 15 coworkers in my Research Institute for Symbolic Computation (RISC), I initiated the Softwarepark Hagenberg in 1987 on request of the Upper Aus trian Government with the objective of creating a scienti?c, technological, and economic impulse for the region and the international community. In the meantime, in a joint e?ort, the Softwarepark Hagenberg has grown to the current (2009) size of over 1000 R&D employees and 1300 students in six research institutions, 40 companies and 20 academic study programs on the bachelor, master's and PhD level. The goal of the Softwarepark Hagenberg is innovation of economy in one of the most important current technologies: software. It is the message of this book that this can only be achieved and guaranteed long term by "watering the root", namely emphasis on research, both basic and applied. In this book, we summarize what has been achieved in terms of research in the various research institutions in the Softwarepark Hagenberg and what research vision we have for the imminent future. When I founded the Softwarepark Hagenberg, in addition to the "watering the root" principle, I had the vision that such a technology park can only prosper if we realize the "magic triangle", i.e. the close interaction of research, academic education, and business applications at one site, see Figure 1.
The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013. The Proceedings of ISCIS 2015 published by Springer brings together rigorously reviewed contributions from leading international experts. It explores new areas of research and technological development in computer science, computer engineering, and information technology, and presents new applications in fast changing fields such as information science, computer science and bioinformatics. The topics covered include (but are not limited to) advances in networking technologies, software defined networks, distributed systems and the cloud, security in the Internet of Things, sensor systems, and machine learning and large data sets.
"Future Internet" is a worldwide hot topic. The Internet has become a critical infrastructure for business development and social interactions. However, the immense growth of the Internet has resulted in additional stresses on its architecture, resulting in a network difficult to monitor, understand, and manage due to its huge scale in terms of connected devices and actors (end users, content providers, equipment vendors, etc). This book presents and discusses the ongoing initiatives and experimental facilities for the creation of new Future Internet Architectures using alternative approaches like Clean Slate and Incremental improvements: It considers several possible internet network use scenarios that include seamless mobility, ad hoc networks, sensor networks, internet of things and new paradigms like content and user centric networks.
A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution. This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow s smart grids. Topics and features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs); explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource."
This book provides key ideas for the design and analysis of complex energy management systems (EMS) for distributed power networks. Future distributed power networks will have strong coupling with (electrified) mobility and information-communication technology (ICT) and this book addresses recent challenges for electric vehicles in the EMS, and how to synthesize the distributed power network using ICT. This book not only describes theoretical developments but also shows many applications using test beds and provides an overview of cutting edge technologies by leading researchers in their corresponding fields. Describes design and analysis of energy management systems; Illustrates the synthesis of distributed energy management systems based on aggregation of local agents; Discusses dependability issues of the distributed EMS with emphasis on the verification scheme based on remote-operational hardware-in-the-loop (HIL) simulation and cybersecurity.
This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon Strous Helmond, The Netherlands EGES Reviewers Agarwal Ashok ACS Technologies Ltd., Bhoopal, India Mark Borman University of Sydney, Australia Erwin Fielt Queensland University of Technology, Brisbane, Australia Ernest Foo Queensland University of Technology, Brisbane, Australia M.P. Gupta Indian Institute of Technology Delhi, India Paul Henman The University of Queensland, Australia Ralf Klischewski German University, Cairo, Egypt Christine Leitner Donau-Universit. at Krems, Austria Miriam Lips Victoria University of Wellington, New Zealand Zoran Milosevic Deontic, Brisbane, Australia Oystein Sabo University of Agder, Norway Jochen Scholl University of Washington, Seattle, USA Leif Skiftenes University of Agder, Norway Weerakoddy Vishanth Brunel University Business School, West London, UK Dirk Werth DFKI, Saarbruc . . ken, Germany Maria Wimmer University Koblenz-Landau, Germany EGES Subreviewers Alexandra Chapko, Andreas Emrich and Marc Graessle German Research Center for Arti?cial Intelligence, Saarbruc .. ken, Germany Kristof Hamann, Kai Jander, Ante Vilenica and Sonja Zaplata University of Hamburg, Germany Global Information Systems Processes (GISP 2010) GISP Co-chairs Jan Pries-Heje Roskilde University, Denmark
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts-which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition, support, and maintenance Examines hardware and software warranty and support models Considers finance and accounting issues for maintenance and support Spells out technology product details Explains postwarranty support and maintenance Provides the understanding to better negotiate with vendor sales teams Illustrating the types of problems typically experienced during product use, the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term, this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating.
Future Application and Middleware Technology on e-Science presents selected papers from the 2008 Korea e-Science All-Hands-Meeting (AHM 2008). Hosted by the Korea Institute of Science and Technology Information, this meeting was designed to bring together developers and users of e-Science applications and enabling information technologies from international and interdisciplinary research communities. The AHM 2008 conference served as a forum for engineers and scientists to present state-of-the-art research and product/tool developments, and to highlight related activities in all fields of e-Science. The works presented in this edited volume bring together cross-disciplinary information on e-Science in one cohesive source. This book is suitable for the professional audience composed of industry researchers and practitioners of e-Science. This volume should also be suitable for advanced-level students in the field.
A rapidly growing number of services and applications along with a dramatic shift in users' consumption models have made media networks an area of increasing importance. Do you know all that you need to know? Supplying you with a clear understanding of the technical and deployment challenges, Media Networks: Architectures, Applications, and Standards covers media networks basics, architectures, protocols, standards, specifications, advanced audiovisual and multimedia services, and future directions. Focusing on video and audio-visual services, it provides wide-scale reference on media networks and the audiovisual domain. The book investigates the different network architectures along with their related protocols and standards. It examines the different digital TV technologies as well as their deployment architectures. Illustrating the role of network operators, service providers, content providers, and manufacturers, this timely reference is divided into three parts: Presents digital TV technologies, including Open IPTV, Mobile TV, 3D video, and content delivery networks Covers media content delivery and quality of experience (QoE) Examines user-centricity and immersive technologies that take into account advanced services personalization, immersive technologies architectures and applications, e-health, and societal challenges The book considers emerging media content delivery architectures including Future Internet, CDN (Content Delivery Networks) architectures and Content Centric Networks (CCN) approaches, while examining the technical challenges and standardization efforts related to such issues. It presents the Quality of Experience (QoE) in Future Internet/ Next Generation Mobile Networks and also covers the management of media (audio/video) information in Future Internet, including transport protocols and compression technologies. The book concludes by describing pressing s
The two volumes LNAI 11649 and 11650 constitute the refereed proceedings of the 20th Annual Conference "Towards Autonomous Robotics", TAROS 2019, held in London, UK, in July 2019. The 87 full papers and 12 short papers presented were carefully reviewed and selected from 101 submissions. The papers present and discuss significant findings and advances in autonomous robotics research and applications. They are organized in the following topical sections: robotic grippers and manipulation; soft robotics, sensing and mobile robots; robotic learning, mapping and planning; human-robot interaction; and robotic systems and applications.
This book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019. The 24 revised full papers were reviewed and selected from 52 submissions and are organized in topical sections covering blockchain and cloud computing, security, wireless sensor networks and Internet of Things, (IoT), FinTech, AI, big data and data analytics.
This book constitutes the proceedings of the 22nd International Symposium on Fundamentals of Computation Theory, FCT 2019, held in Copenhagen, Denmark, in August 2019.The 21 full papers included in this volume were carefully reviewed and selected from 45 submissions. In addition, the book contains 3 invited talks in full-paper length. The papers were organized in topical sections named: formal methods, complexity, and algorithms.
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
This two-volume set LNCS 11569 and 11570 constitutes the refereed proceedings of the Thematic Area on Human Interface and the Management of Information, HIMI 2019, held as part of HCI International 2019 in Orlando, FL, USA. HCII 2019 received a total of 5029 submissions, of which 1275 papers and 209 posters were accepted for publication after a careful reviewing process. The 91 papers presented in the two volumes were organized in topical sections named: Visual information; Data visualization and analytics; Information, cognition and learning; Information, empathy and persuasion; Knowledge management and sharing; Haptic and tactile interaction; Information in virtual and augmented reality; Machine learning and intelligent systems; Human motion and expression recognition and tracking; Medicine, healthcare and quality of life applications.
This two-volume set constitutes the proceedings of the 13th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2019, held as part of the 21st International Conference, HCI International 2019, which took place in Orlando, FL, USA, in July 2019. The total of 1274 papers and 209 posters included in the 35 HCII 2019 proceedings volumes was carefully reviewed and selected from 5029 submissions. UAHCI 2019 includes a total of 95 regular papers; they were organized in topical sections named: universal access theory, methods and tools; novel approaches to accessibility; universal access to learning and education; virtual and augmented reality in universal access; cognitive and learning disabilities; multimodal interaction; and assistive environments. |
You may like...
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Security in Wireless Sensor Networks
George S. Oreku, Tamara Pazynyuk
Hardcover
R2,653
Discovery Miles 26 530
EAI International Conference on Big Data…
Anandakumar Haldorai, Arulmurugan Ramu, …
Hardcover
R4,074
Discovery Miles 40 740
|