0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Conductor: Distributed Adaptation for Heterogeneous Networks (Hardcover, 2002 ed.): Mark D. Yarvis, Peter Reiher, Gerald J.... Conductor: Distributed Adaptation for Heterogeneous Networks (Hardcover, 2002 ed.)
Mark D. Yarvis, Peter Reiher, Gerald J. Popek
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

Internet heterogeneity is driving a new challenge in application development: adaptive software. Together with the increased Internet capacity and new access technologies, network congestion and the use of older technologies, wireless access, and peer-to-peer networking are increasing the heterogeneity of the Internet. Applications should provide gracefully degraded levels of service when network conditions are poor, and enhanced services when network conditions exceed expectations. Existing adaptive technologies, which are primarily end-to-end or proxy-based and often focus on a single deficient link, can perform poorly in heterogeneous networks. Instead, heterogeneous networks frequently require multiple, coordinated, and distributed remedial actions. Conductor: Distributed Adaptation for Heterogeneous Networks describes a new approach to graceful degradation in the face of network heterogeneity - distributed adaptation - in which adaptive code is deployed at multiple points within a network. The feasibility of this approach is demonstrated by conductor, a middleware framework that enables distributed adaptation of connection-oriented, application-level protocols. By adapting protocols, conductor provides application-transparent adaptation, supporting both existing applications and applications designed with adaptation in mind. Conductor: Distributed Adaptation for Heterogeneous Networks introduces new techniques that enable distributed adaptation, making it automatic, reliable, and secure. In particular, we introduce the notion of semantic segmentation, which maintains exactly-once delivery of the semantic elements of a data stream while allowing the stream to be arbitrarily adapted in transit. We also introduce a secure architecture for automatic adaptor selection, protecting user data from unauthorized adaptation. These techniques are described both in the context of conductor and in the broader context of distributed systems. Finally, this book presents empirical evidence from several case studies indicating that distributed adaptation can allow applications to degrade gracefully in heterogeneous networks, providing a higher quality of service to users than other adaptive techniques. Further, experimental results indicate that the proposed techniques can be employed without excessive cost. Thus, distributed adaptation is both practical and beneficial. Conductor: Distributed Adaptation for Heterogeneous Networks is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science.

Mobile and Wireless Network Security and Privacy (Hardcover, 2007 ed.): S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou,... Mobile and Wireless Network Security and Privacy (Hardcover, 2007 ed.)
S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki
R4,483 Discovery Miles 44 830 Ships in 10 - 15 working days

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.

Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.): Jun Li, Peter Reiher, Gerald J. Popek Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.)
Jun Li, Peter Reiher, Gerald J. Popek
R2,969 Discovery Miles 29 690 Ships in 10 - 15 working days

In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In today's Internet age, how do we warn vast numbers of computers about impending cyber attacks?

Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems, etc. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself.

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost.

Disseminating Security Updates at Internet Scale is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. This book will also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere." The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Conductor: Distributed Adaptation for Heterogeneous Networks (Paperback, Softcover reprint of the original 1st ed. 2002): Mark... Conductor: Distributed Adaptation for Heterogeneous Networks (Paperback, Softcover reprint of the original 1st ed. 2002)
Mark D. Yarvis, Peter Reiher, Gerald J. Popek
R2,862 Discovery Miles 28 620 Ships in 10 - 15 working days

Internet heterogeneity is driving a new challenge in application development: adaptive software. Together with the increased Internet capacity and new access technologies, network congestion and the use of older technologies, wireless access, and peer-to-peer networking are increasing the heterogeneity of the Internet. Applications should provide gracefully degraded levels of service when network conditions are poor, and enhanced services when network conditions exceed expectations. Existing adaptive technologies, which are primarily end-to-end or proxy-based and often focus on a single deficient link, can perform poorly in heterogeneous networks. Instead, heterogeneous networks frequently require multiple, coordinated, and distributed remedial actions. Conductor: Distributed Adaptation for Heterogeneous Networks describes a new approach to graceful degradation in the face of network heterogeneity - distributed adaptation - in which adaptive code is deployed at multiple points within a network. The feasibility of this approach is demonstrated by conductor, a middleware framework that enables distributed adaptation of connection-oriented, application-level protocols. By adapting protocols, conductor provides application-transparent adaptation, supporting both existing applications and applications designed with adaptation in mind. Conductor: Distributed Adaptation for Heterogeneous Networks introduces new techniques that enable distributed adaptation, making it automatic, reliable, and secure. In particular, we introduce the notion of semantic segmentation, which maintains exactly-once delivery of the semantic elements of a data stream while allowing the stream to be arbitrarily adapted in transit. We also introduce a secure architecture for automatic adaptor selection, protecting user data from unauthorized adaptation. These techniques are described both in the context of conductor and in the broader context of distributed systems. Finally, this book presents empirical evidence from several case studies indicating that distributed adaptation can allow applications to degrade gracefully in heterogeneous networks, providing a higher quality of service to users than other adaptive techniques. Further, experimental results indicate that the proposed techniques can be employed without excessive cost. Thus, distributed adaptation is both practical and beneficial. Conductor: Distributed Adaptation for Heterogeneous Networks is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science.

Disseminating Security Updates at Internet Scale (Paperback, Softcover reprint of the original 1st ed. 2003): Jun Li, Peter... Disseminating Security Updates at Internet Scale (Paperback, Softcover reprint of the original 1st ed. 2003)
Jun Li, Peter Reiher, Gerald J. Popek
R2,839 Discovery Miles 28 390 Ships in 10 - 15 working days

Disseminating Security Updates at Internet Scale describes a new system, "Revere", that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost. Disseminating Security Updates at Internet Scale will be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere". The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Mobile and Wireless Network Security and Privacy (Paperback, Softcover reprint of hardcover 1st ed. 2007): S. Kami Makki, Peter... Mobile and Wireless Network Security and Privacy (Paperback, Softcover reprint of hardcover 1st ed. 2007)
S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Prosocial Development - A…
Laura M. Padilla-Walker, Gustavo Carlo Hardcover R3,268 Discovery Miles 32 680
The Interpretation of Cultures
Clifford Geertz Paperback R766 Discovery Miles 7 660
My Dash Diet Cookbook - Balanced, Simple…
Natalie Puckett Hardcover R849 R733 Discovery Miles 7 330
Jacques Ellul and the Bible
Jacob Marques Rollison Hardcover R1,303 R1,083 Discovery Miles 10 830
East - 120 Easy and Delicious…
Meera Sodha Hardcover  (2)
R711 Discovery Miles 7 110
The Overstory - Pulitzer Prize-winner…
Richard Powers Paperback  (2)
R275 R254 Discovery Miles 2 540
Baseball in Evansville - Booms, Busts…
Kevin Wirthwein Paperback R561 R521 Discovery Miles 5 210
Meat - The Ultimate Guide
Annelien Pienaar Paperback  (1)
R495 R464 Discovery Miles 4 640
Intersections of Law and Culture at the…
Julie Fraser, Brianne McGonigle Leyh Hardcover R4,587 Discovery Miles 45 870
Words and Power - Computers, Language…
Bernadette Longo Hardcover R1,094 Discovery Miles 10 940

 

Partners