|
Showing 1 - 3 of
3 matches in All Departments
Security is a major concern in an increasingly multimedia-defined
universe where the Internet serves as an indispensable resource for
information and entertainment. Digital Rights Management (DRM) is
the technology by which network systems protect and provide access
to critical and time-sensitive copyrighted material and/or personal
information. This book equips savvy technology professionals and
their aspiring collegiate proteges with the latest technologies,
strategies and methodologies needed to successfully thwart off
those who thrive on security holes and weaknesses.
Filled with sample application scenarios and algorithms, this book
provides an in-depth examination of present and future field
technologies including encryption, authentication, copy control,
tagging, tracing, conditional access and media identification. The
authors present a diversified blend of theory and practice and
focus on the constantly changing developments in multimedia
applications thus providing an admirably comprehensive book.
* Discusses state-of-the-art multimedia authentication and
fingerprinting techniques
* Presents several practical methodologies from industry, including
broadcast encryption, digital media forensics and 3D mesh
watermarking
* Focuses on the need for security in multimedia applications found
on computer networks, cell phones and emerging mobile computing
devices
Peer-to-Peer (P2P) networks enable users to directly share digital
content (such as audio, video, and text files) as well as real-time
data (such as telephony traffic) with other users without depending
on a central server. Although originally popularized by unlicensed
online music services such as Napster, P2P networking has recently
emerged as a viable multimillion dollar business model for the
distribution of academic and clinical information,
telecommunications, and social networking. Written at an accessible
level for any reader familiar with fundamental Internet protocols,
Peer-to-Peer Networking and Applications explains the conceptual
operations and architecture underlying basic P2P systems using
well-known commercial systems as models. The book also delineates
the latest research directions, thereby providing not only a
sophisticated understanding of current systems, but also the means
to improve upon these systems with innovations that will better
performance, security, and flexibility. Peer-to-Peer Networking and
Applications is thus both a valuable starting point and an
important reference to those practioners employed by any of the 200
companies with approximately $400 million invested in this new and
lucrative technology.
* Uses well-known commercial P2P systems as models, thus
demonstrating real-world applicability.
* Discusses how current research trends in wireless networking,
high-def content, DRM, etc. will intersect with P2P, allowing
readers to account for future developments in their designs.
* Provides online access to the Overlay Weaver P2P emulator, an
open source tool that supports a number of peer-to-peer
applications with which readers can practice.
|
You may like...
Operation Joktan
Amir Tsarfati, Steve Yohn
Paperback
(1)
R250
R185
Discovery Miles 1 850
Not available
|