• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Computer Systems: Theory, Technology, and Applications » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Computer Systems: Theory, Technology, and Applications

ISBN-13: 9781475780758 / Angielski / Miękka / 2013 / 338 str.

Andrew James Herbert; Karen I. B. Spaerck Jones
Computer Systems: Theory, Technology, and Applications Herbert, Andrew James 9781475780758 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Computer Systems: Theory, Technology, and Applications

ISBN-13: 9781475780758 / Angielski / Miękka / 2013 / 338 str.

Andrew James Herbert; Karen I. B. Spaerck Jones
cena 201,72 zł
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research. From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are based upon Needham's pioneering research work. A critical collection of edited-survey research papers spanning the entire range of Roger Needham's distinguished scientific career, from operating systems to distributed computing and security. Many of the world's leading researchers survey their topics' latest developments and acknowledge the theoretical foundations of Needham's work. Introduction to book written by Rick Rashid, Director of Microsoft Research Worldwide.

Kategorie:
Informatyka
Kategorie BISAC:
Computers > Hardware - General
Computers > Networking - Hardware
Computers > Languages - General
Wydawca:
Springer
Seria wydawnicza:
Monographs in Computer Science
Język:
Angielski
ISBN-13:
9781475780758
Rok wydania:
2013
Wydanie:
Softcover Repri
Numer serii:
000015473
Ilość stron:
338
Waga:
0.55 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Contents Preface Roger Needham: 50 + 5 Meeting Programme Contributors Introduction: Roger Needham Rick Rashid 1 On Access Control, Data Integration, and Their Languages Martín Abadi 2 Protocol Analysis, Composability and Computation Ross Anderson, Michael Bond 3 Access Control in Distributed Systems Jean Bacon, Ken Moody 4 Implementing Condition Variables with Semaphores Andrew D. Birrell 5 Clumps, Clusters and Classification Christopher M. Bishop 6 How to Implement Unnecessary Mutexes Mike Burrows 7 Bioware Languages Luca Cardelli 8 The Economics of Open Systems David D. Clark 9 From Universe to Global Internet Jon Crowcroft 10 Needham-Schroeder Goes to Court Dorothy E. Denning 11 The Design of Reliable Operating Systems Peter Denning 12 An Historical Connection between Time-Sharing and Virtual Circuits Sandy Fraser 13 On Cross-Platform Security Li Gong 14 Distributed Computing Economics Jim Gray 15 The Titan Influence David Hartley 16 Middleware? Muddleware? Andrew Herbert 17 Grand Challenges for Computing Research Tony Hoare 18 Sentient Computing Andy Hopper 19 Cyber Security in Open Systems Anita Jones 20 Software Components: Only the Giants Survive Butler W. Lampson 21 Security Protocols: Who Knows What Exactly? Peter Landrock 22 Volume Rendering by Ray-Casting in Shear-Image Order Hugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler 23 A Conceptual Authorization Model for Web Services Paul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward 24 The Trouble with Standards E. Stewart Lee 25 Novelty in the Nemesis Operating System Ian Leslie 26 A Technology Transfer Retrospective Roy Levin 27 An Optical LAN Derek McAuley 28 What's in a Name? Robin Milner 29 The Cryptographic Role of the Cleaning Lady Bob Morris 30 Real Time in a Real Operating System Sape J. Mullender, Pierre G. Jansen 31 Zen and the Art of Research Management John Naughton, Robert W. Taylor 32 The Descent of BAN Lawrence C. Paulson 33 Brief Encounters Brian Randell 34 Retrieval System Models: What's New? Stephen Robertson, Karen Spärck Jones 35 Slammer: An Urgent Wake-Up Call Jerome H. Saltzer 36 Caching Trust Rather Than Content M. Satyanarayanan 37 Least Privilege and More Fred B. Schneider 38 Using Sharing to Simplify System Management Michael D. Schroeder 39 An RSA-Related Number-Theoretic Surprise Gustavus J. Simmons 40 Application-Private Networks Jonathan M. Smith 41 Using the CORAL System to Discover Attacks on Security Protocols Graham Steel, Alan Bundy, Ewen Denney 42 On the Role of Binding and Rate Adaptation in Packet Networks David Tennenhouse 43 Technologies for Portable Computing Chuck Thacker 44 Multiple Alternative Voting David Wheeler 45 The Semiotics of Umbrellas John Wilkes 46 Computers for Specialized Application Areas Maurice Wilkes 47 Computer Security? Roger Needham Roger Needham: Publications Karen Spärck Jones

 

Computer Systems:  Theory, Technology, and Applications

A Tribute to Roger Needham

Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a pioneer of computer systems research and a noted innovator in the crucial area of system security.

Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book assembles a collection of short articles showing the state-of-the-art in systems, from formal calculi to mobile devices, from operating systems to distributed computing and security—while also honoring Needham’s important contributions.

Among the topics addressed:

Access control, data integration, and their languages

Clumps, clusters, and classification

The economics of open systems

The Needham – Schroeder authentication protocol

Sentient computing

A technology transfer retrospective

Real time in a real operating system

Application-private networks

Technologies for portable computing

An authorization model for web services

Challenges for computing research

Protocol analysis, composability, and computation

This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia