Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This timely text/reference describes the development and implementation of large-scale distributed processing systems using open source tools and technologies.
This practically-focused reference presents a comprehensive overview of the state of the art in Cloud Computing, and examines the potential for future Cloud and Cloud-related technologies to address specific industrial and research challenges.
This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on.
This timely book covers topics at the intersection of algorithms and networking. It builds a complete picture of the current state of research on Next Generation Networks and the challenges ahead. Particular focus is given to evolving research initiatives.
This practically-focused reference presents a comprehensive overview of the state of the art in Cloud Computing, and examines the potential for future Cloud and Cloud-related technologies to address specific industrial and research challenges.
This updated edition will help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. The book uniquely bridges the gap between information security, information systems security and information warfare.
This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments. Practical insights are offered by an international selection of pre-eminent authorities, including case studies, best practices, and balanced corporate analyses. Emphasis is placed on the use of the latest software technologies and frameworks for life-cycle methods, including the design, implementation and testing stages of software development. Topics and features:· Reviews approaches for reusability, cost and time estimation, and for functional size measurement of distributed software applications· Discusses the core characteristics of a large-scale defense system, and the design of software project management (SPM) as a service· Introduces the 3PR framework, research on crowdsourcing software development, and an innovative approach to modeling large-scale multi-agent software systems· Examines a system architecture for ambient assisted living, and an approach to cloud migration and management assessment· Describes a software error proneness mechanism, a novel Scrum process for use in the defense domain, and an ontology annotation for SPM in distributed environments· Investigates the benefits of agile project management for higher education institutions, and SPM that combines software and data engineering This important text/reference is essential reading for project managers and software engineers involved in developing software for distributed computing environments. Students and researchers interested in SPM technologies and frameworks will also find the work to be an invaluable resource. Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and an Associate Lecturer (Research) at the University of Derby, UK. He also holds positions as Foreign Professor at NUST and IIU in Islamabad, Pakistan, and Professor Extraordinaire at the North West University Potchefstroom, South Africa.
The main objective of pervasive computing systems is to create environments where computers become invisible by being seamlessly integrated and connected into our everyday environment, where such embedded computers can then provide inf- mation and exercise intelligent control when needed, but without being obtrusive.
Social networks provide a powerful abstraction of the structure and dynamics of people-to-technology interaction. Comparing social animal interaction with web-based social interaction, this volume explores human behavior in web-based social networks.
WMNs have found u- ful applications in a broad range of domains such as broadband home networking, commercial/business networking, and community networking - particularly attr- tive in offering broadband wireless access with low initial installation and set-up costs.
The main objective of pervasive computing systems is to create environments where computers become invisible by being seamlessly integrated and connected into our everyday environment, where such embedded computers can then provide inf- mation and exercise intelligent control when needed, but without being obtrusive.
An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components.
Social networks provide a powerful abstraction of the structure and dynamics of people-to-technology interaction. Comparing social animal interaction with web-based social interaction, this volume explores human behavior in web-based social networks.
This book sets out a vision ofpervasive IT through intelligent spaces and describes some ofthe progress that has been made towards its realisation.
This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. outlines the key challenges in MPS, covering security for ubiquitous mobile commerce and usability issues;
With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs.
Topics and features: introduces the fundamentals of social media retrieval, presenting the most important areas of research in this domain; reviews advances in encoding, compression and network architectures for the exchange of social media information; describes a range of applications related to social media.
An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components.
This book covers advances in speech and video compression, assessment and monitoring of VoIP quality and next-generation network architecture for multimedia services. Offers case studies with step-by-step instructions, worked examples and chapter-end problems.
With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs.
These features help to set up a network fast in situations where there is no existing network setup or in times when setting up a fixed infrastructure network is considered infeasible, for example, in times of emergency or during relief operations.
This book presents a detailed review of high-performance computing infrastructures for next-generation big data and fast data analytics. describes the network infrastructure requirements for effective transfer of big data, and the storage infrastructure requirements of applications which generate big data;
Topics and features: introduces the fundamentals of social media retrieval, presenting the most important areas of research in this domain; reviews advances in encoding, compression and network architectures for the exchange of social media information; describes a range of applications related to social media.
This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. provides a detailed examination of platform-agnostic middleware architecture, including important implementation details;
Serving as a flagship driver towards advance research in the area of Big Data platforms and applications, this book provides a platform for the dissemination of advanced topics of theory, research efforts and analysis, and implementation oriented on methods, techniques and performance evaluation.
This book introduces the components, operations, industry protocols and standards of distributed control system (DCS), and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics.
This book provides a practical guide to flow-aware networking (FAN), one of the most promising new quality-of-service architectures for the Future Internet. analyzes aspects of fair transmission in FAN, reviewing algorithms that improve transmission of streaming flows during network failures;
Serving as a flagship driver towards advance research in the area of Big Data platforms and applications, this book provides a platform for the dissemination of advanced topics of theory, research efforts and analysis, and implementation oriented on methods, techniques and performance evaluation.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.