
ilość książek w kategorii: 13901
![]() |
Broadband Satellite Communication Systems and the Challenges of Mobility: Ifip Tc6 Workshops on Broadband Satellite Communication Systems and Challeng
ISBN: 9780387239934 / Angielski / Twarda / 2005 / 248 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professional researchers in the field of telecommunications, computer networking and wireless networks. Recently the request of multimedia services has been rapidly increasing and satellite networks appear to be attractive for a fast service deployment and for extending the typical service area of terrestrial systems. In comparison with traditional wide area networks, a characteristic of satellite communication systems is their ability in... Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professio... |
cena:
402,53 |
![]() |
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)
ISBN: 9780387243436 / Angielski / Twarda / 2005 / 196 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME). Within the UK economy, the notion of TEISMEs is one that forms the focus for this research. Other technologies that enabled information are also discussed. For example electronic mail (e-mail), voice mail, facsimile machines (fax), teleconferencing, data...
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discover...
|
cena:
402,53 |
![]() |
Web Content Delivery
ISBN: 9780387243566 / Angielski / Twarda / 2005 / 394 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The concept of content delivery (also known as content distribution) is be coming increasingly important due to rapidly growing demands for efficient distribution and fast access of information in the Internet. Content delivery is very broad and comprehensive in that the contents for distribution cover a wide range of types with significantly different characteristics and performance concerns, including HTML documents, images, multimedia streams, database tables, and dynamically generated contents. Moreover, to facilitate ubiqui tous information access, the network architectures and hardware...
The concept of content delivery (also known as content distribution) is be coming increasingly important due to rapidly growing demands for efficient ...
|
cena:
603,81 |
![]() |
Multimedia Encryption and Watermarking
ISBN: 9780387244259 / Angielski / Twarda / 2005 / 327 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio... Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which ena... |
cena:
603,81 |
![]() |
Hop Integrity in the Internet
ISBN: 9780387244266 / Angielski / Twarda / 2005 / 112 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet. A suite of protocols for providing... Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks... |
cena:
402,53 |
![]() |
Peer-To-Peer Computing for Mobile Networks: Information Discovery and Dissemination
ISBN: 9780387244273 / Angielski / Twarda / 2008 / 214 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This world This small world the great Odysseus Elytis 1. 1 Wireless data communications In the 19th century, the advent of the telegraph and telephone forever changed how messages were transmitted around the world. Radio, television, c- puters, and the Internet further revolutionized communication in the 20th 1 century. Equally important, the e?ect of Moore s law is transforming a niche technology into a ubiquitous one, expanding the innovations in an increasingly networked world. Wireless devices are becoming smaller, easier to use and p- vasive. In e?ect, people are depending more and...
This world This small world the great Odysseus Elytis 1. 1 Wireless data communications In the 19th century, the advent of the telegraph and telepho...
|
cena:
402,53 |
![]() |
Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France
ISBN: 9780387250878 / Angielski / Twarda / 2005 / 149 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout... Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Worksho... |
cena:
201,24 |
![]() |
Semantic Management of Middleware
ISBN: 9780387276304 / Angielski / Twarda / 2006 / 268 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Their functionalities have mostly been developed and managed with the help of administration tools and corresponding configuration files, recently in XML. Though this constitutes flexibility for developing and administrating a distributed application, the conceptual model underlying the different configurations is only implicit. To remedy such problems, Semantic Management of Middleware... Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intri... |
cena:
402,53 |
![]() |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9780387290157 / Angielski / Twarda / 2006 / 140 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
cena:
402,53 |
![]() |
Combinatorial Optimization in Communication Networks
ISBN: 9780387290256 / Angielski / Twarda / 2006 / 658 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication networks. The objective of this book is to advance and promote the theory and applications of combinatorial optimization in communication networks. Each chapter of the book is written by an expert dealing with theoretical, computational, or applied aspects of combinatorial optimization. Topics covered in the book include the combinatorial optimization problems arising in optical networks, wireless ad hoc networks, sensor networks, mobile communication... Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication networks. The... |
cena:
603,81 |
![]() |
Canadian Semantic Web
ISBN: 9780387298153 / Angielski / Twarda / 2006 / 228 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. This volume includes but is not limited to the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining."
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. This volume includes but is...
|
cena:
603,81 |
![]() |
Eunice 2005: Networks and Applications Towards a Ubiquitously Connected World: Ifip International Workshop on Networked Applications, Colmenarejo, Mad
ISBN: 9780387308159 / Angielski / Twarda / 2006 / 300 str. Termin realizacji zamówienia: ok. 22 dni roboczych. EUNICE is a network of Universities throughout Europe. The EUNICE network has been created to foster the mobility of students, faculty nembers and research scientists working in the field of information and com llunication technologies and to promote educational and research cooperation between its member institutions. The prime means for implementing these goals is the annual Summer School organized by the member institutions. From its conception, the EUNICE Summer Schools were designed as unique events where the joint participation of PhD students and supervisors working in the field of...
EUNICE is a network of Universities throughout Europe. The EUNICE network has been created to foster the mobility of students, faculty nembers and res...
|
cena:
402,53 |
![]() |
Network Security Policies and Procedures
ISBN: 9780387309378 / Angielski / Twarda / 2006 / 244 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will... Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P... |
cena:
402,53 |
![]() |
Adaptive Learning of Polynomial Networks: Genetic Programming, Backpropagation and Bayesian Methods
ISBN: 9780387312392 / Angielski / Twarda / 2006 / 336 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book provides theoretical and practical knowledge for develop- ment of algorithms that infer linear and nonlinear models. It offers a methodology for inductive learning of polynomial neural network mod- els from data. The design of such tools contributes to better statistical data modelling when addressing tasks from various areas like system identification, chaotic time-series prediction, financial forecasting and data mining. The main claim is that the model identification process involves several equally important steps: finding the model structure, estimating the model weight...
This book provides theoretical and practical knowledge for develop- ment of algorithms that infer linear and nonlinear models. It offers a methodology...
|
cena:
603,81 |
![]() |
Malware Detection
ISBN: 9780387327204 / Angielski / Twarda / 2006 / 324 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have... Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi... |
cena:
1207,67 |
![]() |
Security for Wireless Sensor Networks
ISBN: 9780387327235 / Angielski / Twarda / 2006 / 212 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target...
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monito...
|
cena:
603,81 |
![]() |
Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges and Solutions
ISBN: 9780387329215 / Angielski / Twarda / 2006 / 510 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book comprises a selection of papers presented at a symposium organized under the aegis of COST Telecommunications Action 285. The main objective of the book is to enhance existing tools and develop new modeling and simulation tools for research in emerging multi-service telecommunication networks in the areas of model performance improvements, multilayer traffic modeling, and the important issue of evaluation and validation of the new modeling tools. This book comprises a selection of papers presented at a symposium organized under the aegis of COST Telecommunications Action 285. The main object... |
cena:
805,10 |
![]() |
Mobile and Wireless Communication Networks: IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and Wireless Communications Ne
ISBN: 9780387346342 / Angielski / Twarda / 2006 / 252 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has been held in a Latin American country. Topics in this series include:
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are ... |
cena:
402,53 |
![]() |
Knowledge and Data Management in GRIDs
ISBN: 9780387378305 / Angielski / Twarda / 2006 / 254 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Data and knowledge play a key role in both current and future GRIDs. The issues concerning representation, discovery, and integration of data and knowledge in dynamic distributed environments can be addressed by exploiting features offered by GRID Technologies. Current research activities are leveraging the GRID for the provision of generic- and domain-specific solutions and services for data management and knowledge discovery. Knowledge and Data Management in GRIDs is the third volume of the CoreGRID series and brings together scientific contributions by researchers and scientists... Data and knowledge play a key role in both current and future GRIDs. The issues concerning representation, discovery, and integration of data and k... |
cena:
603,81 |
![]() |
Abstraction, Refinement and Proof for Probabilistic Systems
ISBN: 9780387401157 / Angielski / Twarda / 2004 / 388 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm .
Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm .
|
cena:
603,81 |