Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits


Title: Opportunistic Mobile Networks Advances and Applications / by Sudip Misra, Barun Kumar Saha, Sujata Pal.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Sudip. author.
Saha, Barun Kumar. author.
Pal, Sujata. author.
SpringerLink (Online service)

General Notes: Part I: Introduction -- Origins and Characteristics -- Delay Tolerant Routing and Applications -- A Developer’s Guide to the ONE Simulator -- Part II: Human Aspects in Opportunistic Mobile Networks -- Emerging Sensing Paradigms and Intelligence in Networks -- Aspects of Human Emotions and Networks -- Part III: Cooperation in Opportunistic Mobile Networks -- Evolutionary Game in Wireless Networks -- Enforcing Cooperation in OMNs -- Part IV: Advanced Topics -- Heterogeneity in OMNs -- Opportunistic Mobile Networks: Towards Reality -- The Big Picture.
This clearly-written and practically-focused textbook/reference reviews the fundamental theory, varied applications, and latest breakthroughs in Delay Tolerant Networks (DTNs). Presenting a specific focus on Opportunistic Mobile Networks (OMNs), the text carefully considers the influence of human aspects, and examines emerging forms of inter-node cooperation. Readers will learn how to master protocol development and testing, overcome issues of non-cooperative behavior, and address heterogeneity in OMNs and other networks. Topics and features: Contains review terms, study exercises and programming exercises in each chapter, with the solutions and source code available at an associated website Introduces the fundamentals of DTNs, covering OMNs, Pocket Switched Networks (PSNs), and Mission-Oriented Opportunistic Networks (MOONs) Describes the Opportunistic Network Environment (ONE) simulator, explaining how to set up a simulation project using NetBeans, and the version control software Git Provides detailed insights into the development and testing of protocols, together with a set of best practices for increased productivity and optimized performance Examines human aspects in the context of communication networks, from human-centric applications to the impact of emotion on human-network interplay Proposes various schemes for inter-node cooperation in DTNs/OMNs, including incentive-based and game theoretic approaches, as well as the DISCUSS scheme Presents a detailed discussion on aspects of heterogeneity in DTNs, and a comprehensive review of the latest research on DTNs/OMNs Students and instructors will find this easy-to-follow work to be ideally suitable as a textbook for introductory courses on OMNs and advanced courses on communication networks. Researchers will be greatly interested in the descriptions of state-of-the-art developments in OMNs, wireless sensor, and ad hoc networks. Practitioners developing real-world applications will also benefit from the coverage of relevant technical specifications and patents.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319290317
Subject: Computer science.
Philosophy.
Computer communication systems.
Computer simulation.
Sociology.
Computer science.
Computer Communication Networks.
Simulation and Modeling.
Philosophy of Technology.
Sociological Theory.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2016.
Contents: Part I: Introduction -- Origins and Characteristics -- Delay Tolerant Routing and Applications -- A Developer’s Guide to the ONE Simulator -- Part II: Human Aspects in Opportunistic Mobile Networks -- Emerging Sensing Paradigms and Intelligence in Networks -- Aspects of Human Emotions and Networks -- Part III: Cooperation in Opportunistic Mobile Networks -- Evolutionary Game in Wireless Networks -- Enforcing Cooperation in OMNs -- Part IV: Advanced Topics -- Heterogeneity in OMNs -- Opportunistic Mobile Networks: Towards Reality -- The Big Picture.
Physical Description: XXXII, 303 p. 66 illus., 63 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-29031-7
Publication Date: 2016.

There are no items available

Title: Connectivity Frameworks for Smart Devices The Internet of Things from a Distributed Computing Perspective / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
This timely volume provides a review of the state-of-the-art frameworks and methodologies for connecting diverse objects and devices according to the vision for an Internet of Things (IoT). A specific focus is placed on the communication, security, and privacy aspects of device connectivity in distributed environments. Insights and case studies are provided by an authoritative selection of contributors of international repute into the latest research advances and practical approaches with respect to the connectivity of heterogeneous smart and sensory devices. Topics and features: Examines aspects of device connectivity within the IoT Presents a resource-based architecture for IoT, and proposes a resource management framework for corporate device clouds Reviews integration approaches for the IoT environment, and discusses performance optimization of intelligent home networks Introduces a novel solution for interoperable data management in multi-clouds, and suggests an approach that addresses the debate over network neutrality in the IoT Describes issues of data security, privacy, access control, and authentication in the distributed IoT environment Reviews the evolution of VANETs in relation to the Internet of Vehicles, and provides a perspective on developing smart sustainable cities This invaluable text/reference will be of great benefit to a broad audience, from students and researchers interested in the IoT vision, to practicing communication engineers and network security specialists.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319331249
Subject: Computer science.
Computer communication systems.
Artificial intelligence.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Artificial Intelligence (incl. Robotics).

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
Physical Description: XIX, 356 p. 98 illus., 57 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-33124-9
Publication Date: 2016.

There are no items available

Title: Connectivity Frameworks for Smart Devices The Internet of Things from a Distributed Computing Perspective / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
This timely volume provides a review of the state-of-the-art frameworks and methodologies for connecting diverse objects and devices according to the vision for an Internet of Things (IoT). A specific focus is placed on the communication, security, and privacy aspects of device connectivity in distributed environments. Insights and case studies are provided by an authoritative selection of contributors of international repute into the latest research advances and practical approaches with respect to the connectivity of heterogeneous smart and sensory devices. Topics and features: Examines aspects of device connectivity within the IoT Presents a resource-based architecture for IoT, and proposes a resource management framework for corporate device clouds Reviews integration approaches for the IoT environment, and discusses performance optimization of intelligent home networks Introduces a novel solution for interoperable data management in multi-clouds, and suggests an approach that addresses the debate over network neutrality in the IoT Describes issues of data security, privacy, access control, and authentication in the distributed IoT environment Reviews the evolution of VANETs in relation to the Internet of Vehicles, and provides a perspective on developing smart sustainable cities This invaluable text/reference will be of great benefit to a broad audience, from students and researchers interested in the IoT vision, to practicing communication engineers and network security specialists.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319331249
Subject: Computer science.
Computer communication systems.
Artificial intelligence.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Artificial Intelligence (incl. Robotics).

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
Physical Description: XIX, 356 p. 98 illus., 57 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-33124-9
Publication Date: 2016.

There are no items available

Title: Resource Management for Big Data Platforms Algorithms, Modelling, and High-Performance Computing Techniques / edited by Florin Pop, Joanna Kołodziej, Beniamino Di Martino.
Computer Communications and Networks,
Computer communications and networks,

Author: Pop, Florin. editor.
Kołodziej, Joanna. editor.
Di Martino, Beniamino. editor.
SpringerLink (Online service)

General Notes: Performance Modeling of Big Data Oriented Architectures -- Workflow Scheduling Techniques for Big Data Platforms -- Cloud Technologies: A New Level for Big Data Mining -- Agent Based High-Level Interaction Patterns for Modeling Individual and Collective Optimizations Problems -- Maximize Profit for Big Data Processing in Distributed Datacenters -- Energy and Power Efficiency in the Cloud -- Context Aware and Reinforcement Learning Based Load Balancing System for Green Clouds -- High-Performance Storage Support for Scientific Big Data Applications on the Cloud -- Information Fusion for Improving Decision-Making in Big Data Applications -- Load Balancing and Fault Tolerance Mechanisms for Scalable and Reliable Big Data Analytics -- Fault Tolerance in MapReduce: A Survey -- Big Data Security -- Big Biological Data Management -- Optimal Worksharing of DNA Sequence Analysis on Accelerated Platforms -- Feature Dimensionality Reduction for Mammographic Report Classification -- Parallel Algorithms for Multi-Relational Data Mining: Application to Life Science Problems -- Parallelization of Sparse Matrix Kernels for Big Data Applications -- Delivering Social Multimedia Content with Scalability -- A Java-Based Distributed Approach for Generating Large-Scale Social Network Graphs -- Predicting Video Virality on Twitter -- Big Data uses in Crowd Based Systems -- Evaluation of a Web Crowd–Sensing IoT Ecosystem Providing Big Data Analysis -- A Smart City Fighting Pollution by Efficiently Managing and Processing Big Data from Sensor Networks.
This book constitutes a flagship driver towards presenting and supporting advance research in the area of Big Data platforms and applications. Extracting valuable information from raw data is especially difficult considering the velocity of growing data from year to year and the fact that 80% of data is unstructured. In addition, data sources are heterogeneous (various sensors, users with different profiles, etc.) and are located in different situations or contexts. Successful contributions may range from advanced technologies, applications and innovative solutions to global optimization problems in scalable large-scale computing systems to development of methods, conceptual and theoretical models related to Big Data applications and massive data storage and processing. The book provides, in this sense, a platform for the dissemination of advanced topics of theory, research efforts and analysis and implementation for Big Data platforms and applications being oriented on methods, techniques and performance evaluation. This book presents new ideas, analysis, implementations and evaluation of next-generation Big Data platforms and applications. In 23 chapters, several important formulations of the architecture design, optimization techniques, advanced analytics methods, biological, medical and social media applications are presented. These subjects represent the main objectives of ICT COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet) and the research presented in these chapters was performed by joint collaboration of members from this action. This volume will serve as a reference for students, researchers and industry practitioners working in or interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp the key concerns and potential solutions for the selected topics.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319448817
Subject: Computer science.
Computer software -- Reusability.
Computer communication systems.
Database management.
Computer simulation.
Computer science.
Computer Communication Networks.
Simulation and Modeling.
Performance and Reliability.
Database management.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Performance Modeling of Big Data Oriented Architectures -- Workflow Scheduling Techniques for Big Data Platforms -- Cloud Technologies: A New Level for Big Data Mining -- Agent Based High-Level Interaction Patterns for Modeling Individual and Collective Optimizations Problems -- Maximize Profit for Big Data Processing in Distributed Datacenters -- Energy and Power Efficiency in the Cloud -- Context Aware and Reinforcement Learning Based Load Balancing System for Green Clouds -- High-Performance Storage Support for Scientific Big Data Applications on the Cloud -- Information Fusion for Improving Decision-Making in Big Data Applications -- Load Balancing and Fault Tolerance Mechanisms for Scalable and Reliable Big Data Analytics -- Fault Tolerance in MapReduce: A Survey -- Big Data Security -- Big Biological Data Management -- Optimal Worksharing of DNA Sequence Analysis on Accelerated Platforms -- Feature Dimensionality Reduction for Mammographic Report Classification -- Parallel Algorithms for Multi-Relational Data Mining: Application to Life Science Problems -- Parallelization of Sparse Matrix Kernels for Big Data Applications -- Delivering Social Multimedia Content with Scalability -- A Java-Based Distributed Approach for Generating Large-Scale Social Network Graphs -- Predicting Video Virality on Twitter -- Big Data uses in Crowd Based Systems -- Evaluation of a Web Crowd–Sensing IoT Ecosystem Providing Big Data Analysis -- A Smart City Fighting Pollution by Efficiently Managing and Processing Big Data from Sensor Networks.
Physical Description: XIII, 516 p. 138 illus., 57 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-44881-7
Publication Date: 2016.

There are no items available

Title: Resource Management for Big Data Platforms Algorithms, Modelling, and High-Performance Computing Techniques / edited by Florin Pop, Joanna Kołodziej, Beniamino Di Martino.
Computer Communications and Networks,
Computer communications and networks,

Author: Pop, Florin. editor.
Kołodziej, Joanna. editor.
Di Martino, Beniamino. editor.
SpringerLink (Online service)

General Notes: Performance Modeling of Big Data Oriented Architectures -- Workflow Scheduling Techniques for Big Data Platforms -- Cloud Technologies: A New Level for Big Data Mining -- Agent Based High-Level Interaction Patterns for Modeling Individual and Collective Optimizations Problems -- Maximize Profit for Big Data Processing in Distributed Datacenters -- Energy and Power Efficiency in the Cloud -- Context Aware and Reinforcement Learning Based Load Balancing System for Green Clouds -- High-Performance Storage Support for Scientific Big Data Applications on the Cloud -- Information Fusion for Improving Decision-Making in Big Data Applications -- Load Balancing and Fault Tolerance Mechanisms for Scalable and Reliable Big Data Analytics -- Fault Tolerance in MapReduce: A Survey -- Big Data Security -- Big Biological Data Management -- Optimal Worksharing of DNA Sequence Analysis on Accelerated Platforms -- Feature Dimensionality Reduction for Mammographic Report Classification -- Parallel Algorithms for Multi-Relational Data Mining: Application to Life Science Problems -- Parallelization of Sparse Matrix Kernels for Big Data Applications -- Delivering Social Multimedia Content with Scalability -- A Java-Based Distributed Approach for Generating Large-Scale Social Network Graphs -- Predicting Video Virality on Twitter -- Big Data uses in Crowd Based Systems -- Evaluation of a Web Crowd–Sensing IoT Ecosystem Providing Big Data Analysis -- A Smart City Fighting Pollution by Efficiently Managing and Processing Big Data from Sensor Networks.
This book constitutes a flagship driver towards presenting and supporting advance research in the area of Big Data platforms and applications. Extracting valuable information from raw data is especially difficult considering the velocity of growing data from year to year and the fact that 80% of data is unstructured. In addition, data sources are heterogeneous (various sensors, users with different profiles, etc.) and are located in different situations or contexts. Successful contributions may range from advanced technologies, applications and innovative solutions to global optimization problems in scalable large-scale computing systems to development of methods, conceptual and theoretical models related to Big Data applications and massive data storage and processing. The book provides, in this sense, a platform for the dissemination of advanced topics of theory, research efforts and analysis and implementation for Big Data platforms and applications being oriented on methods, techniques and performance evaluation. This book presents new ideas, analysis, implementations and evaluation of next-generation Big Data platforms and applications. In 23 chapters, several important formulations of the architecture design, optimization techniques, advanced analytics methods, biological, medical and social media applications are presented. These subjects represent the main objectives of ICT COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet) and the research presented in these chapters was performed by joint collaboration of members from this action. This volume will serve as a reference for students, researchers and industry practitioners working in or interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp the key concerns and potential solutions for the selected topics.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319448817
Subject: Computer science.
Computer software -- Reusability.
Computer communication systems.
Database management.
Computer simulation.
Computer science.
Computer Communication Networks.
Simulation and Modeling.
Performance and Reliability.
Database management.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Performance Modeling of Big Data Oriented Architectures -- Workflow Scheduling Techniques for Big Data Platforms -- Cloud Technologies: A New Level for Big Data Mining -- Agent Based High-Level Interaction Patterns for Modeling Individual and Collective Optimizations Problems -- Maximize Profit for Big Data Processing in Distributed Datacenters -- Energy and Power Efficiency in the Cloud -- Context Aware and Reinforcement Learning Based Load Balancing System for Green Clouds -- High-Performance Storage Support for Scientific Big Data Applications on the Cloud -- Information Fusion for Improving Decision-Making in Big Data Applications -- Load Balancing and Fault Tolerance Mechanisms for Scalable and Reliable Big Data Analytics -- Fault Tolerance in MapReduce: A Survey -- Big Data Security -- Big Biological Data Management -- Optimal Worksharing of DNA Sequence Analysis on Accelerated Platforms -- Feature Dimensionality Reduction for Mammographic Report Classification -- Parallel Algorithms for Multi-Relational Data Mining: Application to Life Science Problems -- Parallelization of Sparse Matrix Kernels for Big Data Applications -- Delivering Social Multimedia Content with Scalability -- A Java-Based Distributed Approach for Generating Large-Scale Social Network Graphs -- Predicting Video Virality on Twitter -- Big Data uses in Crowd Based Systems -- Evaluation of a Web Crowd–Sensing IoT Ecosystem Providing Big Data Analysis -- A Smart City Fighting Pollution by Efficiently Managing and Processing Big Data from Sensor Networks.
Physical Description: XIII, 516 p. 138 illus., 57 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-44881-7
Publication Date: 2016.

There are no items available

Title: Automated Workflow Scheduling in Self-Adaptive Clouds Concepts, Algorithms and Methods / by G. Kousalya, P. Balakrishnan, C. Pethuru Raj.
Computer Communications and Networks,
Computer communications and networks,

Author: Kousalya, G. author.
Balakrishnan, P. author.
Pethuru Raj, C. author.
SpringerLink (Online service)

General Notes: Stepping into the Digital Intelligence Era -- Demystifying the Traits of Software-Defined Cloud Environments (SDCEs) -- Workflow Management Systems -- Workflow Scheduling Algorithms and Approaches -- Workflow Modeling and Simulation Techniques -- Execution of Workflow Scheduling in Cloud Middleware -- Workflow Predictions through Operational Analytics and Machine Learning -- Workflow Integration and Orchestration - Opportunities and the Challenges -- Workload Consolidation through Automated Workload Scheduling -- Automated Optimization Methods for Workflow Execution -- Hybrid IT: Characteristics and Capabilities.
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: Describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds Presents simulation-based case studies, and details of real-time test bed-based implementations Offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms Examines the considerations for the main parameters in projects limited by budget and time constraints Covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book. Dr. G. Kousalya is a Professor in the Department of Computer Science and Engineering at Coimbatore Institute of Technology, Coimbatore, India. Dr. P. Balakrishnan is an Associate Professor in the Department of Computer Science and Engineering at SASTRA University, Thanjavur, India. Dr. C. Pethuru Raj is the chief architect for Reliance Jio Cloud, Bangalore, India. His other publications include the Springer title High-Performance Big-Data Analytics.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319569826
Subject: Computer science.
Input-output equipment (Computers).
Computer communication systems.
Artificial intelligence.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Input/Output and Data Communications.
Artificial Intelligence (incl. Robotics).

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Stepping into the Digital Intelligence Era -- Demystifying the Traits of Software-Defined Cloud Environments (SDCEs) -- Workflow Management Systems -- Workflow Scheduling Algorithms and Approaches -- Workflow Modeling and Simulation Techniques -- Execution of Workflow Scheduling in Cloud Middleware -- Workflow Predictions through Operational Analytics and Machine Learning -- Workflow Integration and Orchestration - Opportunities and the Challenges -- Workload Consolidation through Automated Workload Scheduling -- Automated Optimization Methods for Workflow Execution -- Hybrid IT: Characteristics and Capabilities.
Physical Description: XVII, 225 p. 74 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-56982-6
Publication Date: 2017.

There are no items available

Title: Automated Workflow Scheduling in Self-Adaptive Clouds Concepts, Algorithms and Methods / by G. Kousalya, P. Balakrishnan, C. Pethuru Raj.
Computer Communications and Networks,
Computer communications and networks,

Author: Kousalya, G. author.
Balakrishnan, P. author.
Pethuru Raj, C. author.
SpringerLink (Online service)

General Notes: Stepping into the Digital Intelligence Era -- Demystifying the Traits of Software-Defined Cloud Environments (SDCEs) -- Workflow Management Systems -- Workflow Scheduling Algorithms and Approaches -- Workflow Modeling and Simulation Techniques -- Execution of Workflow Scheduling in Cloud Middleware -- Workflow Predictions through Operational Analytics and Machine Learning -- Workflow Integration and Orchestration - Opportunities and the Challenges -- Workload Consolidation through Automated Workload Scheduling -- Automated Optimization Methods for Workflow Execution -- Hybrid IT: Characteristics and Capabilities.
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: Describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds Presents simulation-based case studies, and details of real-time test bed-based implementations Offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms Examines the considerations for the main parameters in projects limited by budget and time constraints Covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book. Dr. G. Kousalya is a Professor in the Department of Computer Science and Engineering at Coimbatore Institute of Technology, Coimbatore, India. Dr. P. Balakrishnan is an Associate Professor in the Department of Computer Science and Engineering at SASTRA University, Thanjavur, India. Dr. C. Pethuru Raj is the chief architect for Reliance Jio Cloud, Bangalore, India. His other publications include the Springer title High-Performance Big-Data Analytics.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319569826
Subject: Computer science.
Input-output equipment (Computers).
Computer communication systems.
Artificial intelligence.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Input/Output and Data Communications.
Artificial Intelligence (incl. Robotics).

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Stepping into the Digital Intelligence Era -- Demystifying the Traits of Software-Defined Cloud Environments (SDCEs) -- Workflow Management Systems -- Workflow Scheduling Algorithms and Approaches -- Workflow Modeling and Simulation Techniques -- Execution of Workflow Scheduling in Cloud Middleware -- Workflow Predictions through Operational Analytics and Machine Learning -- Workflow Integration and Orchestration - Opportunities and the Challenges -- Workload Consolidation through Automated Workload Scheduling -- Automated Optimization Methods for Workflow Execution -- Hybrid IT: Characteristics and Capabilities.
Physical Description: XVII, 225 p. 74 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-56982-6
Publication Date: 2017.

There are no items available

Title: Guide to Computer Network Security by Joseph Migga Kizza.
Computer Communications and Networks,
Computer communications and networks,

Author: Kizza, Joseph Migga. author.
SpringerLink (Online service)

General Notes: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem – The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things. Topics and features: · Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies · Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment · Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems · Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW) · Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises · Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference “toolbox” on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module. .

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319556062
Subject: Computer science.
Computer communication systems.
Data structures (Computer Science).
Information storage and retrieval.
Management information systems.
Computer science.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 4th ed. 2017.
Contents: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem – The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
Physical Description: XXIV, 569 p. 111 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-55606-2
Publication Date: 2017.

There are no items available

Title: Guide to Computer Network Security by Joseph Migga Kizza.
Computer Communications and Networks,
Computer communications and networks,

Author: Kizza, Joseph Migga. author.
SpringerLink (Online service)

General Notes: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem – The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things. Topics and features: · Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies · Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment · Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems · Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW) · Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises · Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference “toolbox” on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module. .

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319556062
Subject: Computer science.
Computer communication systems.
Data structures (Computer Science).
Information storage and retrieval.
Management information systems.
Computer science.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 4th ed. 2017.
Contents: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem – The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
Physical Description: XXIV, 569 p. 111 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-55606-2
Publication Date: 2017.

There are no items available

Title: Cloud Computing Principles, Systems and Applications / edited by Nick Antonopoulos, Lee Gillam.
Computer Communications and Networks,
Computer communications and networks,

Author: Antonopoulos, Nick. editor.
Gillam, Lee. editor.
SpringerLink (Online service)

General Notes: Part I: General Principles -- The Rise of Cloud Computing in the Era of Emerging Networked Society -- Mirror, Mirror on the Wall, How Do I Dimension My Cloud After All? -- A Taxonomy of Adaptive Resource Management Mechanisms in Virtual Machines: Recent Progress and Challenges -- Part II: Science Cloud -- Exploring Cloud Elasticity in Scientific Applications -- Clouds and Reproducibility: A Way to Go to Scientific Experiments? -- Big Data Analytics in Healthcare: A Cloud-Based Framework for Generating Insights -- Part III: Data Cloud -- Implementing MapReduce Applications in Dynamic Cloud Environments -- High Performance Graph Data Management and Mining in Cloud Environments with X10 -- Part IV: Multi-Clouds -- Facilitating Cloud Federation Management via Data Interoperability -- Applying Self-* Principles in Heterogeneous Cloud Environments -- Part V: Performance and Efficiency -- Optimizing the Profit and QoS of Virtual Brokers in the Cloud -- Adaptive Resource Allocation for Load Balancing in Cloud -- Cloud-Supported Certification for Energy-Efficient Web Browsing and Services -- Datacentre Event Analysis for Knowledge Discovery in Large-Scale Cloud Environments.
This practically-focused text/reference presents a comprehensive overview of the present state of the art in Cloud Computing, and examines the potential for future Cloud and Cloud-related technologies to address specific industrial and research challenges. Compiled as a series of selected papers from leading Cloud researchers, this new edition recognizes the relative maturity of Cloud, as offers contrast to the first edition, and explores both established and emergent principles, techniques, protocols and algorithms involved with the design, development, and management of Cloud-based systems. The text reviews a range of applications and methods for linking Clouds, undertaking data management and scientific data analysis, and addressing requirements both of data analysis and also of management of large scale and complex systems. This new edition also extends into the emergent next generation of mobile telecommunications, relating network function virtualization and mobile edge Cloud Computing, as supports emergence of, for example, Smart Grids and Smart Cities. As with the first edition, emphasis continues to be placed on the four quality-of-service cornerstones of efficiency, scalability, robustness, and security. Topics and features: Introduces the essential technical characteristics and concepts behind the new developments in Cloud Computing, including architectural principles, performance evaluation, and quality of service Provides in-depth coverage of how Clouds can be designed to produce scientific insights and analysis, addressing agility, reproducibility, consistency and scalability, and proposing novel techniques and systems Offers an overview of novel approaches in producing scalable, high performance and decentralized Cloud systems, including P2P and graphs systems, to enable fault tolerant, scalable and high performance data intensive Clouds Presents ideas for federation and interoperability across Clouds, and the use of autonomic computing and other intelligent approaches to self-manage the federated Clouds Includes a Foreword by Dr. Omer F. Rana, Professor of Performance Engineering at Cardiff University, UK This authoritative volume will be especially appealing to researchers and students interested in aspects of Cloud Computing research, implementation and deployment. Professional system architects and developers, as well as technical managers and IT consultants, will also find the work to serve as an invaluable reference.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319546452
Subject: Computer science.
Computer software -- Reusability.
Computer system failures.
Computer science.
System Performance and Evaluation.
Performance and Reliability.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 2nd ed. 2017.
Contents: Part I: General Principles -- The Rise of Cloud Computing in the Era of Emerging Networked Society -- Mirror, Mirror on the Wall, How Do I Dimension My Cloud After All? -- A Taxonomy of Adaptive Resource Management Mechanisms in Virtual Machines: Recent Progress and Challenges -- Part II: Science Cloud -- Exploring Cloud Elasticity in Scientific Applications -- Clouds and Reproducibility: A Way to Go to Scientific Experiments? -- Big Data Analytics in Healthcare: A Cloud-Based Framework for Generating Insights -- Part III: Data Cloud -- Implementing MapReduce Applications in Dynamic Cloud Environments -- High Performance Graph Data Management and Mining in Cloud Environments with X10 -- Part IV: Multi-Clouds -- Facilitating Cloud Federation Management via Data Interoperability -- Applying Self-* Principles in Heterogeneous Cloud Environments -- Part V: Performance and Efficiency -- Optimizing the Profit and QoS of Virtual Brokers in the Cloud -- Adaptive Resource Allocation for Load Balancing in Cloud -- Cloud-Supported Certification for Energy-Efficient Web Browsing and Services -- Datacentre Event Analysis for Knowledge Discovery in Large-Scale Cloud Environments.
Physical Description: XX, 410 p. 105 illus., 73 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-54645-2
Publication Date: 2017.

There are no items available

Title: Cloud Computing Principles, Systems and Applications / edited by Nick Antonopoulos, Lee Gillam.
Computer Communications and Networks,
Computer communications and networks,

Author: Antonopoulos, Nick. editor.
Gillam, Lee. editor.
SpringerLink (Online service)

General Notes: Part I: General Principles -- The Rise of Cloud Computing in the Era of Emerging Networked Society -- Mirror, Mirror on the Wall, How Do I Dimension My Cloud After All? -- A Taxonomy of Adaptive Resource Management Mechanisms in Virtual Machines: Recent Progress and Challenges -- Part II: Science Cloud -- Exploring Cloud Elasticity in Scientific Applications -- Clouds and Reproducibility: A Way to Go to Scientific Experiments? -- Big Data Analytics in Healthcare: A Cloud-Based Framework for Generating Insights -- Part III: Data Cloud -- Implementing MapReduce Applications in Dynamic Cloud Environments -- High Performance Graph Data Management and Mining in Cloud Environments with X10 -- Part IV: Multi-Clouds -- Facilitating Cloud Federation Management via Data Interoperability -- Applying Self-* Principles in Heterogeneous Cloud Environments -- Part V: Performance and Efficiency -- Optimizing the Profit and QoS of Virtual Brokers in the Cloud -- Adaptive Resource Allocation for Load Balancing in Cloud -- Cloud-Supported Certification for Energy-Efficient Web Browsing and Services -- Datacentre Event Analysis for Knowledge Discovery in Large-Scale Cloud Environments.
This practically-focused text/reference presents a comprehensive overview of the present state of the art in Cloud Computing, and examines the potential for future Cloud and Cloud-related technologies to address specific industrial and research challenges. Compiled as a series of selected papers from leading Cloud researchers, this new edition recognizes the relative maturity of Cloud, as offers contrast to the first edition, and explores both established and emergent principles, techniques, protocols and algorithms involved with the design, development, and management of Cloud-based systems. The text reviews a range of applications and methods for linking Clouds, undertaking data management and scientific data analysis, and addressing requirements both of data analysis and also of management of large scale and complex systems. This new edition also extends into the emergent next generation of mobile telecommunications, relating network function virtualization and mobile edge Cloud Computing, as supports emergence of, for example, Smart Grids and Smart Cities. As with the first edition, emphasis continues to be placed on the four quality-of-service cornerstones of efficiency, scalability, robustness, and security. Topics and features: Introduces the essential technical characteristics and concepts behind the new developments in Cloud Computing, including architectural principles, performance evaluation, and quality of service Provides in-depth coverage of how Clouds can be designed to produce scientific insights and analysis, addressing agility, reproducibility, consistency and scalability, and proposing novel techniques and systems Offers an overview of novel approaches in producing scalable, high performance and decentralized Cloud systems, including P2P and graphs systems, to enable fault tolerant, scalable and high performance data intensive Clouds Presents ideas for federation and interoperability across Clouds, and the use of autonomic computing and other intelligent approaches to self-manage the federated Clouds Includes a Foreword by Dr. Omer F. Rana, Professor of Performance Engineering at Cardiff University, UK This authoritative volume will be especially appealing to researchers and students interested in aspects of Cloud Computing research, implementation and deployment. Professional system architects and developers, as well as technical managers and IT consultants, will also find the work to serve as an invaluable reference.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319546452
Subject: Computer science.
Computer software -- Reusability.
Computer system failures.
Computer science.
System Performance and Evaluation.
Performance and Reliability.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 2nd ed. 2017.
Contents: Part I: General Principles -- The Rise of Cloud Computing in the Era of Emerging Networked Society -- Mirror, Mirror on the Wall, How Do I Dimension My Cloud After All? -- A Taxonomy of Adaptive Resource Management Mechanisms in Virtual Machines: Recent Progress and Challenges -- Part II: Science Cloud -- Exploring Cloud Elasticity in Scientific Applications -- Clouds and Reproducibility: A Way to Go to Scientific Experiments? -- Big Data Analytics in Healthcare: A Cloud-Based Framework for Generating Insights -- Part III: Data Cloud -- Implementing MapReduce Applications in Dynamic Cloud Environments -- High Performance Graph Data Management and Mining in Cloud Environments with X10 -- Part IV: Multi-Clouds -- Facilitating Cloud Federation Management via Data Interoperability -- Applying Self-* Principles in Heterogeneous Cloud Environments -- Part V: Performance and Efficiency -- Optimizing the Profit and QoS of Virtual Brokers in the Cloud -- Adaptive Resource Allocation for Load Balancing in Cloud -- Cloud-Supported Certification for Energy-Efficient Web Browsing and Services -- Datacentre Event Analysis for Knowledge Discovery in Large-Scale Cloud Environments.
Physical Description: XX, 410 p. 105 illus., 73 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-54645-2
Publication Date: 2017.

There are no items available

Title: Software Project Management for Distributed Computing Life-Cycle Methods for Developing Scalable and Reliable Tools / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Characteristics and Estimation of Software Projects for Distributed Computing -- Modelling of Reusability Estimation in Software Design with External Constraints -- Estimation of Costs and Time for the Development of Distributed Software -- Using COSMIC for the Functional Size Measurement of Distributed Applications in Cloud Environments -- Characteristics of Large-Scale Defense Projects and the Dominance of Software and Software Project Management -- Software Project Management as a Service (SPMaaS): Perspectives and Benefits -- Part II: Approached and Frameworks for Software Development and Software Project Management -- Component-Based Hybrid Reference Architecture for Managing Adaptable Embedded Software Development -- 3PR Framework for Software Project Management: People, Processes, Products and Risks -- CrowdSWD: A Novel Framework for Crowdsourcing Software Development Inspired by the Concept of Biological Metaphor -- An Approach to Migrate and Manage Software: Cloud Based Requirements Management -- A Novel Approach to Modelling Distributed Systems - Using Large-Scale Multi-Agent Systems -- Part III: Advances in Software Project Management and Distributed Software Development -- Optimizing Software Error Proneness Prediction using Bird Mating Algorithm -- i(mproved)Agile: A Customized Scrum Process for Project Management in Defense & Security -- Ontology Annotation for Software Engineering Project Management in Multi-site Distributed Software Development Environments -- Investigating the Scope for Agile Project Management to be Adopted by Higher Education Institutions -- Software Project Management for Combined Software and Data Engineering.
This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments. Practical insights are offered by an international selection ofpre-eminent authorities, including case studies, best practices, and balanced corporate analyses. Emphasis is placed on the use of the latest software technologies and frameworks for life-cycle methods, including the design, implementation and testing stages of software development. Topics and features: · Reviews approaches for reusability, cost and time estimation, and for functional size measurement of distributed software applications · Discusses the core characteristics of a large-scale defense system, and the design of software project management (SPM) as a service · Introduces the 3PR framework, research on crowdsourcing software development, and an innovative approach to modeling large-scale multi-agent software systems · Examines a system architecture for ambient assisted living, and an approach to cloud migration and management assessment · Describes a software error proneness mechanism, a novel Scrum process for use in the defense domain, and an ontology annotation for SPM in distributed environments · Investigates the benefits of agile project management for higher education institutions, and SPM that combines software and data engineering This important text/reference is essential reading for project managers and software engineers involved in developing software for distributed computing environments. Students and researchers interested in SPM technologies and frameworks will also find the work to be an invaluable resource. Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and an Associate Lecturer (Research) at the University of Derby, UK. He also holds positions as Foreign Professor at NUST and IIU in Islamabad, Pakistan, and Professor Extraordinaire at the North West University Potchefstroom, South Africa.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319543253
Subject: Computer science.
Computer communication systems.
Software engineering.
Computers.
Management information systems.
Computer science.
Computer Communication Networks.
Software engineering.
Models and Principles.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Characteristics and Estimation of Software Projects for Distributed Computing -- Modelling of Reusability Estimation in Software Design with External Constraints -- Estimation of Costs and Time for the Development of Distributed Software -- Using COSMIC for the Functional Size Measurement of Distributed Applications in Cloud Environments -- Characteristics of Large-Scale Defense Projects and the Dominance of Software and Software Project Management -- Software Project Management as a Service (SPMaaS): Perspectives and Benefits -- Part II: Approached and Frameworks for Software Development and Software Project Management -- Component-Based Hybrid Reference Architecture for Managing Adaptable Embedded Software Development -- 3PR Framework for Software Project Management: People, Processes, Products and Risks -- CrowdSWD: A Novel Framework for Crowdsourcing Software Development Inspired by the Concept of Biological Metaphor -- An Approach to Migrate and Manage Software: Cloud Based Requirements Management -- A Novel Approach to Modelling Distributed Systems - Using Large-Scale Multi-Agent Systems -- Part III: Advances in Software Project Management and Distributed Software Development -- Optimizing Software Error Proneness Prediction using Bird Mating Algorithm -- i(mproved)Agile: A Customized Scrum Process for Project Management in Defense & Security -- Ontology Annotation for Software Engineering Project Management in Multi-site Distributed Software Development Environments -- Investigating the Scope for Agile Project Management to be Adopted by Higher Education Institutions -- Software Project Management for Combined Software and Data Engineering.
Physical Description: XXIII, 391 p. 102 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-54325-3
Publication Date: 2017.

There are no items available

Title: Software Project Management for Distributed Computing Life-Cycle Methods for Developing Scalable and Reliable Tools / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Characteristics and Estimation of Software Projects for Distributed Computing -- Modelling of Reusability Estimation in Software Design with External Constraints -- Estimation of Costs and Time for the Development of Distributed Software -- Using COSMIC for the Functional Size Measurement of Distributed Applications in Cloud Environments -- Characteristics of Large-Scale Defense Projects and the Dominance of Software and Software Project Management -- Software Project Management as a Service (SPMaaS): Perspectives and Benefits -- Part II: Approached and Frameworks for Software Development and Software Project Management -- Component-Based Hybrid Reference Architecture for Managing Adaptable Embedded Software Development -- 3PR Framework for Software Project Management: People, Processes, Products and Risks -- CrowdSWD: A Novel Framework for Crowdsourcing Software Development Inspired by the Concept of Biological Metaphor -- An Approach to Migrate and Manage Software: Cloud Based Requirements Management -- A Novel Approach to Modelling Distributed Systems - Using Large-Scale Multi-Agent Systems -- Part III: Advances in Software Project Management and Distributed Software Development -- Optimizing Software Error Proneness Prediction using Bird Mating Algorithm -- i(mproved)Agile: A Customized Scrum Process for Project Management in Defense & Security -- Ontology Annotation for Software Engineering Project Management in Multi-site Distributed Software Development Environments -- Investigating the Scope for Agile Project Management to be Adopted by Higher Education Institutions -- Software Project Management for Combined Software and Data Engineering.
This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments. Practical insights are offered by an international selection ofpre-eminent authorities, including case studies, best practices, and balanced corporate analyses. Emphasis is placed on the use of the latest software technologies and frameworks for life-cycle methods, including the design, implementation and testing stages of software development. Topics and features: · Reviews approaches for reusability, cost and time estimation, and for functional size measurement of distributed software applications · Discusses the core characteristics of a large-scale defense system, and the design of software project management (SPM) as a service · Introduces the 3PR framework, research on crowdsourcing software development, and an innovative approach to modeling large-scale multi-agent software systems · Examines a system architecture for ambient assisted living, and an approach to cloud migration and management assessment · Describes a software error proneness mechanism, a novel Scrum process for use in the defense domain, and an ontology annotation for SPM in distributed environments · Investigates the benefits of agile project management for higher education institutions, and SPM that combines software and data engineering This important text/reference is essential reading for project managers and software engineers involved in developing software for distributed computing environments. Students and researchers interested in SPM technologies and frameworks will also find the work to be an invaluable resource. Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and an Associate Lecturer (Research) at the University of Derby, UK. He also holds positions as Foreign Professor at NUST and IIU in Islamabad, Pakistan, and Professor Extraordinaire at the North West University Potchefstroom, South Africa.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319543253
Subject: Computer science.
Computer communication systems.
Software engineering.
Computers.
Management information systems.
Computer science.
Computer Communication Networks.
Software engineering.
Models and Principles.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Characteristics and Estimation of Software Projects for Distributed Computing -- Modelling of Reusability Estimation in Software Design with External Constraints -- Estimation of Costs and Time for the Development of Distributed Software -- Using COSMIC for the Functional Size Measurement of Distributed Applications in Cloud Environments -- Characteristics of Large-Scale Defense Projects and the Dominance of Software and Software Project Management -- Software Project Management as a Service (SPMaaS): Perspectives and Benefits -- Part II: Approached and Frameworks for Software Development and Software Project Management -- Component-Based Hybrid Reference Architecture for Managing Adaptable Embedded Software Development -- 3PR Framework for Software Project Management: People, Processes, Products and Risks -- CrowdSWD: A Novel Framework for Crowdsourcing Software Development Inspired by the Concept of Biological Metaphor -- An Approach to Migrate and Manage Software: Cloud Based Requirements Management -- A Novel Approach to Modelling Distributed Systems - Using Large-Scale Multi-Agent Systems -- Part III: Advances in Software Project Management and Distributed Software Development -- Optimizing Software Error Proneness Prediction using Bird Mating Algorithm -- i(mproved)Agile: A Customized Scrum Process for Project Management in Defense & Security -- Ontology Annotation for Software Engineering Project Management in Multi-site Distributed Software Development Environments -- Investigating the Scope for Agile Project Management to be Adopted by Higher Education Institutions -- Software Project Management for Combined Software and Data Engineering.
Physical Description: XXIII, 391 p. 102 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-54325-3
Publication Date: 2017.

There are no items available

Title: Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools / by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita.
Computer Communications and Networks,
Computer communications and networks,

Author: Bhuyan, Monowar H. author.
Bhattacharyya, Dhruba K. author.
Kalita, Jugal K. author.
SpringerLink (Online service)

General Notes: Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319651880
Subject: Computer science.
Computer software -- Reusability.
Computer communication systems.
Computer security.
Electrical engineering.
Computer science.
Computer Communication Networks.
Systems and Data Security.
Performance and Reliability.
Communications Engineering, Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
Physical Description: XXII, 263 p. 98 illus., 9 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-65188-0
Publication Date: 2017.

There are no items available

Title: Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools / by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita.
Computer Communications and Networks,
Computer communications and networks,

Author: Bhuyan, Monowar H. author.
Bhattacharyya, Dhruba K. author.
Kalita, Jugal K. author.
SpringerLink (Online service)

General Notes: Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319651880
Subject: Computer science.
Computer software -- Reusability.
Computer communication systems.
Computer security.
Electrical engineering.
Computer science.
Computer Communication Networks.
Systems and Data Security.
Performance and Reliability.
Communications Engineering, Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
Physical Description: XXII, 263 p. 98 illus., 9 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-65188-0
Publication Date: 2017.

There are no items available

Title: Grids, Clouds and Virtualization edited by Massimo Cafaro, Giovanni Aloisio.
Computer Communications and Networks,
Computer communications and networks,

Author: Cafaro, Massimo.
Aloisio, Giovanni.
SpringerLink (Online service)

General Notes: Grids, Clouds, and Virtualization -- Quality of Service for I/O Workloads in Multicore Virtualized Servers -- Architectures for Enhancing Grid Infrastructures with Cloud Computing -- Scientific Workflows in the Cloud -- Auspice: Automatic Service Planning in Cloud/Grid Environments -- Parameter Sweep Job Submission to Clouds -- Energy Aware Clouds -- Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds -- Application-Level Interoperability Across Grids and Clouds.
<p>Research into grid computing has been driven by the need to solve large-scale, increasingly complex problems for scientific applications. Yet the applications of grid computing for business and casual users did not begin to emerge until the development of the concept of cloud computing, fueled by advances in virtualization techniques, coupled with the increased availability of ever-greater Internet bandwidth. The appeal of this new paradigm is mainly based on its simplicity, and the affordable price for seamless access to both computational and storage resources.</p> <p>This timely text/reference introduces the fundamental principles and techniques underlying grids, clouds and virtualization technologies, as well as reviewing the latest research and expected future developments in the field. Readers are guided through the key topics by internationally recognized experts, enabling them to develop their understanding of an area likely to play an ever more significant role in coming years.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Presents contributions from an international selection of experts in the field</li> <li>Provides a thorough introduction and overview of existing technologies in grids, clouds and virtualization, including a brief history of the field</li> <li>Examines the basic requirements for performance isolation of virtual machines on multi-core servers, analyzing a selection of system virtualization technologies</li> <li>Examines both business and scientific applications of grids and clouds, including their use in the life sciences and for high-performance computing</li> <li>Explores cloud building technologies, architectures for enhancing grid infrastructures with cloud computing, and cloud performance</li> <li>Discusses energy aware grids and clouds, workflows on grids and clouds, and cloud and grid programming models</li> <li>Presents case-studies and novel results related to interoperability across grids and clouds</li> </ul> <p>This useful text will enable interested readers to familiarize themselves with the key topics of grids, clouds and virtualization, and to contribute to new advances in the field. Researchers, undergraduate and graduate students, system designers and programmers, and IT policy makers will all benefit from the material covered.</p> <p><strong>Dr. Massimo Cafaro </strong>is Assistant Professor at the Department of Engineering for Innovation at the University of Salento, Lecce, Italy.</p> <p><strong>Dr. Giovanni Aloisio </strong>is Full Professor of Information Processing Systems at the Department of Engineering for Innovation at the University of Salento, Lecce, Italy. </p>

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9780857290496
Subject: Computer science.
Software engineering.
Computer system performance.
Information systems.
Computer science.
Special Purpose and Application-Based Systems.
System Performance and Evaluation.
Software engineering.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Grids, Clouds, and Virtualization -- Quality of Service for I/O Workloads in Multicore Virtualized Servers -- Architectures for Enhancing Grid Infrastructures with Cloud Computing -- Scientific Workflows in the Cloud -- Auspice: Automatic Service Planning in Cloud/Grid Environments -- Parameter Sweep Job Submission to Clouds -- Energy Aware Clouds -- Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds -- Application-Level Interoperability Across Grids and Clouds.
Physical Description: XV, 235 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-0-85729-049-6
Publication Date: 2011.

There are no items available

Title: Grids, Clouds and Virtualization edited by Massimo Cafaro, Giovanni Aloisio.
Computer Communications and Networks,
Computer communications and networks,

Author: Cafaro, Massimo.
Aloisio, Giovanni.
SpringerLink (Online service)

General Notes: Grids, Clouds, and Virtualization -- Quality of Service for I/O Workloads in Multicore Virtualized Servers -- Architectures for Enhancing Grid Infrastructures with Cloud Computing -- Scientific Workflows in the Cloud -- Auspice: Automatic Service Planning in Cloud/Grid Environments -- Parameter Sweep Job Submission to Clouds -- Energy Aware Clouds -- Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds -- Application-Level Interoperability Across Grids and Clouds.
<p>Research into grid computing has been driven by the need to solve large-scale, increasingly complex problems for scientific applications. Yet the applications of grid computing for business and casual users did not begin to emerge until the development of the concept of cloud computing, fueled by advances in virtualization techniques, coupled with the increased availability of ever-greater Internet bandwidth. The appeal of this new paradigm is mainly based on its simplicity, and the affordable price for seamless access to both computational and storage resources.</p> <p>This timely text/reference introduces the fundamental principles and techniques underlying grids, clouds and virtualization technologies, as well as reviewing the latest research and expected future developments in the field. Readers are guided through the key topics by internationally recognized experts, enabling them to develop their understanding of an area likely to play an ever more significant role in coming years.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Presents contributions from an international selection of experts in the field</li> <li>Provides a thorough introduction and overview of existing technologies in grids, clouds and virtualization, including a brief history of the field</li> <li>Examines the basic requirements for performance isolation of virtual machines on multi-core servers, analyzing a selection of system virtualization technologies</li> <li>Examines both business and scientific applications of grids and clouds, including their use in the life sciences and for high-performance computing</li> <li>Explores cloud building technologies, architectures for enhancing grid infrastructures with cloud computing, and cloud performance</li> <li>Discusses energy aware grids and clouds, workflows on grids and clouds, and cloud and grid programming models</li> <li>Presents case-studies and novel results related to interoperability across grids and clouds</li> </ul> <p>This useful text will enable interested readers to familiarize themselves with the key topics of grids, clouds and virtualization, and to contribute to new advances in the field. Researchers, undergraduate and graduate students, system designers and programmers, and IT policy makers will all benefit from the material covered.</p> <p><strong>Dr. Massimo Cafaro </strong>is Assistant Professor at the Department of Engineering for Innovation at the University of Salento, Lecce, Italy.</p> <p><strong>Dr. Giovanni Aloisio </strong>is Full Professor of Information Processing Systems at the Department of Engineering for Innovation at the University of Salento, Lecce, Italy. </p>

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9780857290496
Subject: Computer science.
Software engineering.
Computer system performance.
Information systems.
Computer science.
Special Purpose and Application-Based Systems.
System Performance and Evaluation.
Software engineering.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Grids, Clouds, and Virtualization -- Quality of Service for I/O Workloads in Multicore Virtualized Servers -- Architectures for Enhancing Grid Infrastructures with Cloud Computing -- Scientific Workflows in the Cloud -- Auspice: Automatic Service Planning in Cloud/Grid Environments -- Parameter Sweep Job Submission to Clouds -- Energy Aware Clouds -- Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds -- Application-Level Interoperability Across Grids and Clouds.
Physical Description: XV, 235 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-0-85729-049-6
Publication Date: 2011.

There are no items available

Title: Enabling Optical Internet with Advanced Network Technologies edited by Javier Aracil, Franco Callegati.
Computer Communications and Networks,
Computer communications and networks,

Author: Aracil, Javier.
Callegati, Franco.
SpringerLink (Online service)

General Notes: <P>Introduction -- Introduction to IP over WDM -- Optical Packet Switching -- Optical Burst Switching -- Advanced Optical Burst Switched Network Concepts -- Optical Switch Fabrics and their Application.</P>.
<P>Developments in optical transmission systems and electronic routers allow huge bandwidth and ever-increasing capacity. Yet the recent massive deployment of ADSL and broadband access, together with the outburst of new multimedia network services, have resulted in a significant increase in end-user traffic and bandwidth demands. This has motivated research into so-called "transparent optical networks", where the photonic technology is used not only for transmission purposes, but also for implementing more complex functions.</P> <P>This useful textbook/reference provides an overview of the key concepts related to the major issues of optical Internet, and studies traditionally and recently proposed optical switching paradigms. The concise, yet comprehensive coverage presents a detailed comparison of optical switching technologies, and covers architectural issues together with topics such as signaling protocols and Quality of Service (QoS) provision. Additionally, the book provides deep insight into recent advances in optical circuit switching, optical packet switching (OPS) and optical burst switching (OBS) technologies; their performance advantages, their control-plane specifications, their enabling technologies, their applicability in today’s networks, and their cost benefits. Readers need only undergraduate background in computer communication networks on topics related to TCP/IP, SDH and MPLS networks.</P> <P>Topics and features: </P> <UL> <P> <LI>Provides a thorough overview of optical technologies and protocols for the Future Internet, presented by experts in the field from the e-Photon/ONe and BONE European Union Networks of Excellence</LI> <P></P> <P> <LI>Includes detailed examples, enabling readers to isolate similarities and performance differences</LI> <P></P> <P> <LI>Presents a thorough introduction to IP over Wavelength Division Multiplexing; describing SONET/SDH, ASON and GMPLS networks, and discussing the Routing and Wavelength Assignment problem</LI> <P></P> <P> <LI>Explores OPS, including header coding techniques and Fiber Delay Line buffers, as well as buffered switch architectures and Array Wave Grating space switching architectures</LI> <P></P> <P> <LI>Discusses topics relating to OBS, reviewing the issues of QoS provisioning in OBS and the interplay between Transmission Control Protocol and OBS</LI> <P></P> <P> <LI>Describes how an OBS network can support a ubiquitous Grid platform able to address the requirements of a large number of dynamic users</LI> <P></P> <P> <LI>Discusses implementation issues of optical switching fabrics and their applicability in the real world, presenting key performance indicators and describing applications such as Optical Cross Connects and Optical Add/Drop Multiplexers</LI> <P></P></UL> <P></P> <P>This wide-ranging and authoritative text will be a valuable resource for advanced undergraduates, beginning graduates, and researchers studying communications in either Engineering or Computer Science.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848822788
Subject: Computer science.
Information systems.
Computer science.
Information Systems and Communication Service.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Introduction -- Introduction to IP over WDM -- Optical Packet Switching -- Optical Burst Switching -- Advanced Optical Burst Switched Network Concepts -- Optical Switch Fabrics and their Application.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-278-8
Publication Date: 2009.

There are no items available

Title: Enabling Optical Internet with Advanced Network Technologies edited by Javier Aracil, Franco Callegati.
Computer Communications and Networks,
Computer communications and networks,

Author: Aracil, Javier.
Callegati, Franco.
SpringerLink (Online service)

General Notes: <P>Introduction -- Introduction to IP over WDM -- Optical Packet Switching -- Optical Burst Switching -- Advanced Optical Burst Switched Network Concepts -- Optical Switch Fabrics and their Application.</P>.
<P>Developments in optical transmission systems and electronic routers allow huge bandwidth and ever-increasing capacity. Yet the recent massive deployment of ADSL and broadband access, together with the outburst of new multimedia network services, have resulted in a significant increase in end-user traffic and bandwidth demands. This has motivated research into so-called "transparent optical networks", where the photonic technology is used not only for transmission purposes, but also for implementing more complex functions.</P> <P>This useful textbook/reference provides an overview of the key concepts related to the major issues of optical Internet, and studies traditionally and recently proposed optical switching paradigms. The concise, yet comprehensive coverage presents a detailed comparison of optical switching technologies, and covers architectural issues together with topics such as signaling protocols and Quality of Service (QoS) provision. Additionally, the book provides deep insight into recent advances in optical circuit switching, optical packet switching (OPS) and optical burst switching (OBS) technologies; their performance advantages, their control-plane specifications, their enabling technologies, their applicability in today’s networks, and their cost benefits. Readers need only undergraduate background in computer communication networks on topics related to TCP/IP, SDH and MPLS networks.</P> <P>Topics and features: </P> <UL> <P> <LI>Provides a thorough overview of optical technologies and protocols for the Future Internet, presented by experts in the field from the e-Photon/ONe and BONE European Union Networks of Excellence</LI> <P></P> <P> <LI>Includes detailed examples, enabling readers to isolate similarities and performance differences</LI> <P></P> <P> <LI>Presents a thorough introduction to IP over Wavelength Division Multiplexing; describing SONET/SDH, ASON and GMPLS networks, and discussing the Routing and Wavelength Assignment problem</LI> <P></P> <P> <LI>Explores OPS, including header coding techniques and Fiber Delay Line buffers, as well as buffered switch architectures and Array Wave Grating space switching architectures</LI> <P></P> <P> <LI>Discusses topics relating to OBS, reviewing the issues of QoS provisioning in OBS and the interplay between Transmission Control Protocol and OBS</LI> <P></P> <P> <LI>Describes how an OBS network can support a ubiquitous Grid platform able to address the requirements of a large number of dynamic users</LI> <P></P> <P> <LI>Discusses implementation issues of optical switching fabrics and their applicability in the real world, presenting key performance indicators and describing applications such as Optical Cross Connects and Optical Add/Drop Multiplexers</LI> <P></P></UL> <P></P> <P>This wide-ranging and authoritative text will be a valuable resource for advanced undergraduates, beginning graduates, and researchers studying communications in either Engineering or Computer Science.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848822788
Subject: Computer science.
Information systems.
Computer science.
Information Systems and Communication Service.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Introduction -- Introduction to IP over WDM -- Optical Packet Switching -- Optical Burst Switching -- Advanced Optical Burst Switched Network Concepts -- Optical Switch Fabrics and their Application.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-278-8
Publication Date: 2009.

There are no items available

Title: Scheduling for Parallel Processing by Maciej Drozdowski.
Computer Communications and Networks,
Computer communications and networks,

Author: Drozdowski, Maciej.
SpringerLink (Online service)

General Notes: <P>Introduction -- Basics -- Vision of Scheduling in Parallel Systems -- Classic Scheduling Theory -- Parallel Tasks -- Scheduling with Communication Delays -- Divisible Loads -- Back to Scheduling Models.</P>.
<P>To take full advantage of high performance computing, parallel applications must be carefully managed to guarantee quality of service and fairness in using shared resources. Scheduling for parallel computing is an interdisciplinary subject joining many fields, and the broadness of research yields an immense number and diversity of models for understanding scheduling problems.</P> <P></P> <P>This focused and useful book presents scheduling models for parallel processing, problems defined on the grounds of certain scheduling models, and algorithms solving the scheduling problems. As most of the scheduling problems are combinatorial in nature, the methodology of computational complexity theory is examined. Four examples of scheduling models are presented, along with problems and algorithms, before drawing conclusions on their mutual relationships. The book also provides helpful generalizations about scheduling models, their problems and algorithms.</P> <P></P> <P>Topics and features:</P> <P></P> <UL> <P> <LI>Introduces the fundamental scheduling concepts and clarifies the relation between scheduling models, problems, algorithms, and schedules</LI> <P></P> <P> <LI>Discusses the technological aspects of scheduling for parallel processing, demonstrating how highly abstract scheduling policies are determined by the underlying hardware and software</LI> <P></P> <P> <LI>Presents the notions, concepts, and algorithms that are most immediately applicable in parallel processing, including relevant aspects of classic scheduling theory</LI> <P></P> <P> <LI>Examines the parallel task model, analyzing rigid, moldable, malleable tasks, and tasks with shape</LI> <P></P> <P> <LI>Outlines the methodology of computational complexity theory and introduces the basic metrics of parallel application performance</LI> <P></P> <P> <LI>Explores scheduling with communication delays, taking into account the costs of delays</LI> <P></P> <P> <LI>Examines scheduling divisible loads in systems with limited memory, various interconnection types, and cost of usage</LI> <P></P> <P> <LI>Includes detailed illustrations, a comprehensive bibliography, and a helpful notation section</LI> <P></P></UL> <P></P> <P>This unique text will be a valuable resource for researchers in parallel computing, operating systems, management science, and applied mathematics. In addition, lecturers and advanced students needing a solid foundation about scheduling for parallel computing will find the book a critical teaching tool and reference.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848823105
Subject: Computer science.
Computer system performance.
Operating systems (Computers).
Computer software.
Information systems.
Computer science.
Operating systems.
System Performance and Evaluation.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Operations Research, Management Science.
Operations Research/Decision Theory.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Introduction -- Basics -- Vision of Scheduling in Parallel Systems -- Classic Scheduling Theory -- Parallel Tasks -- Scheduling with Communication Delays -- Divisible Loads -- Back to Scheduling Models.</P>.
Physical Description: XIII, 386p. 200 illus., 100 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-310-5
Publication Date: 2009.

There are no items available

Title: Scheduling for Parallel Processing by Maciej Drozdowski.
Computer Communications and Networks,
Computer communications and networks,

Author: Drozdowski, Maciej.
SpringerLink (Online service)

General Notes: <P>Introduction -- Basics -- Vision of Scheduling in Parallel Systems -- Classic Scheduling Theory -- Parallel Tasks -- Scheduling with Communication Delays -- Divisible Loads -- Back to Scheduling Models.</P>.
<P>To take full advantage of high performance computing, parallel applications must be carefully managed to guarantee quality of service and fairness in using shared resources. Scheduling for parallel computing is an interdisciplinary subject joining many fields, and the broadness of research yields an immense number and diversity of models for understanding scheduling problems.</P> <P></P> <P>This focused and useful book presents scheduling models for parallel processing, problems defined on the grounds of certain scheduling models, and algorithms solving the scheduling problems. As most of the scheduling problems are combinatorial in nature, the methodology of computational complexity theory is examined. Four examples of scheduling models are presented, along with problems and algorithms, before drawing conclusions on their mutual relationships. The book also provides helpful generalizations about scheduling models, their problems and algorithms.</P> <P></P> <P>Topics and features:</P> <P></P> <UL> <P> <LI>Introduces the fundamental scheduling concepts and clarifies the relation between scheduling models, problems, algorithms, and schedules</LI> <P></P> <P> <LI>Discusses the technological aspects of scheduling for parallel processing, demonstrating how highly abstract scheduling policies are determined by the underlying hardware and software</LI> <P></P> <P> <LI>Presents the notions, concepts, and algorithms that are most immediately applicable in parallel processing, including relevant aspects of classic scheduling theory</LI> <P></P> <P> <LI>Examines the parallel task model, analyzing rigid, moldable, malleable tasks, and tasks with shape</LI> <P></P> <P> <LI>Outlines the methodology of computational complexity theory and introduces the basic metrics of parallel application performance</LI> <P></P> <P> <LI>Explores scheduling with communication delays, taking into account the costs of delays</LI> <P></P> <P> <LI>Examines scheduling divisible loads in systems with limited memory, various interconnection types, and cost of usage</LI> <P></P> <P> <LI>Includes detailed illustrations, a comprehensive bibliography, and a helpful notation section</LI> <P></P></UL> <P></P> <P>This unique text will be a valuable resource for researchers in parallel computing, operating systems, management science, and applied mathematics. In addition, lecturers and advanced students needing a solid foundation about scheduling for parallel computing will find the book a critical teaching tool and reference.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848823105
Subject: Computer science.
Computer system performance.
Operating systems (Computers).
Computer software.
Information systems.
Computer science.
Operating systems.
System Performance and Evaluation.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Operations Research, Management Science.
Operations Research/Decision Theory.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Introduction -- Basics -- Vision of Scheduling in Parallel Systems -- Classic Scheduling Theory -- Parallel Tasks -- Scheduling with Communication Delays -- Divisible Loads -- Back to Scheduling Models.</P>.
Physical Description: XIII, 386p. 200 illus., 100 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-310-5
Publication Date: 2009.

There are no items available



Title: Guide to e-Science Next Generation Scientific Research and Discovery / edited by Xiaoyu Yang, Lizhe Wang, Wei Jie.
Computer Communications and Networks,
Computer communications and networks,

Author: Yang, Xiaoyu.
Wang, Lizhe.
Jie, Wei.
SpringerLink (Online service)

General Notes: <p><b>Part I: Sharing and Open Research -- </b>Implementing a Grid / Cloud e-Science Infrastructure for Hydrological Sciences -- The German Grid Initiative -- Democratizing Resource-Intensive e-Science Through Peer-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research -- <b>Part II: Data-Intensive e-Science -- </b>A Multi-Disciplinary, Model-Driven, Distributed Science Data System Architecture -- An Integrated Ontology Management and Data Sharing Framework for Large-Scale Cyberinfrastructure -- <b>Part III: Collaborative Research -- </b>An e-Science Cyberinfrastructure for Solar-enabled Water Production and Recycling -- e-Science Infrastructure Interoperability Guide -- Trustworthy Distributed Systems Through Integrity-Reporting -- An Intrusion Diagnosis Perspective on Cloud Computing -- <b>Part IV: Research Automation, Reusability, Reproducibility and Repeatability -- </b>Conventional Workflow Technology for Scientific Simulation -- Facilitating E-Science Discovery Using Scientific Workflows on the Grid -- Concepts and Algorithms of Mapping Grid-Based Workflows to Resources Within an SLA Context -- Orchestrating e-Science with the Workflow Paradigm -- <b>Part V: e-Science: Easy Science -- </b>Face Recognition using Global and Local Salient Features -- OGSA-Based SOA for Collaborative Cancer Research -- e-Science.</p>.
<p>The way in which scientific research is carried out is undergoing a series of radical changes, worldwide, as a result of the digital revolution. However, this “Science 2.0” requires a comprehensive supporting cyber-infrastructure.</p><p>This essential guidebook on e-science presents real-world examples of practices and applications, demonstrating how a range of computational technologies and tools can be employed to build essential infrastructures supporting next-generation scientific research. Each chapter provides introductory material on core concepts and principles, as well as descriptions and discussions of relevant e-science methodologies, architectures, tools, systems, services and frameworks. The guide’s explanations and context present a broad spectrum of different e-science system requirements.</p><p><b>Topics and features:</b></p><ul><li>Includes contributions from an international selection of preeminent e-science experts and practitioners</li><li>Discusses use of mainstream grid computing and peer-to-peer grid technology for “open” research and resource sharing in scientific research</li><li>Presents varied methods for data management in data-intensive research</li><li>Investigates issues of e-infrastructure interoperability, security, trust and privacy for collaborative research</li><li>Examines workflow technology for the automation of scientific processes, and that ensures the research can be reusable, reproducible and repeatable</li><li>Describes applications of e-science, highlighting systems used in the fields of biometrics, clinical medicine, and ecology</li></ul><p>This highly practical text/reference is a “must-have, must-use” resource for both IT professionals and academic researchers. Graduate students will also benefit from the experiences and viewpoints shared by the authors on this important subject, as well as the instructional nature of this guidebook.</p><p><b>Dr. Xiaoyu Yang</b> is a research engineer in the School of Electronics and Computer Science at the University of Southampton, UK. <b>Dr. Lizhe Wang</b> is a research scientist in the Pervasive Technology Institute at Indiana University, Bloomington, IN, USA. <b>Dr. Wei Jie</b> is a lecturer in the School of Computing at Thames Valley University, London, UK.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9780857294395
Subject: Computer science.
Information systems.
Computer science.
Information Systems and Communication Service.
COMPUTER APPLICATIONS.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <p><b>Part I: Sharing and Open Research -- </b>Implementing a Grid / Cloud e-Science Infrastructure for Hydrological Sciences -- The German Grid Initiative -- Democratizing Resource-Intensive e-Science Through Peer-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research -- <b>Part II: Data-Intensive e-Science -- </b>A Multi-Disciplinary, Model-Driven, Distributed Science Data System Architecture -- An Integrated Ontology Management and Data Sharing Framework for Large-Scale Cyberinfrastructure -- <b>Part III: Collaborative Research -- </b>An e-Science Cyberinfrastructure for Solar-enabled Water Production and Recycling -- e-Science Infrastructure Interoperability Guide -- Trustworthy Distributed Systems Through Integrity-Reporting -- An Intrusion Diagnosis Perspective on Cloud Computing -- <b>Part IV: Research Automation, Reusability, Reproducibility and Repeatability -- </b>Conventional Workflow Technology for Scientific Simulation -- Facilitating E-Science Discovery Using Scientific Workflows on the Grid -- Concepts and Algorithms of Mapping Grid-Based Workflows to Resources Within an SLA Context -- Orchestrating e-Science with the Workflow Paradigm -- <b>Part V: e-Science: Easy Science -- </b>Face Recognition using Global and Local Salient Features -- OGSA-Based SOA for Collaborative Cancer Research -- e-Science.</p>.
Physical Description: XXVII, 538p. 222 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-0-85729-439-5
Publication Date: 2011.


Title: Guide to e-Science Next Generation Scientific Research and Discovery / edited by Xiaoyu Yang, Lizhe Wang, Wei Jie.
Computer Communications and Networks,
Computer communications and networks,

Author: Yang, Xiaoyu.
Wang, Lizhe.
Jie, Wei.
SpringerLink (Online service)

General Notes: <p><b>Part I: Sharing and Open Research -- </b>Implementing a Grid / Cloud e-Science Infrastructure for Hydrological Sciences -- The German Grid Initiative -- Democratizing Resource-Intensive e-Science Through Peer-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research -- <b>Part II: Data-Intensive e-Science -- </b>A Multi-Disciplinary, Model-Driven, Distributed Science Data System Architecture -- An Integrated Ontology Management and Data Sharing Framework for Large-Scale Cyberinfrastructure -- <b>Part III: Collaborative Research -- </b>An e-Science Cyberinfrastructure for Solar-enabled Water Production and Recycling -- e-Science Infrastructure Interoperability Guide -- Trustworthy Distributed Systems Through Integrity-Reporting -- An Intrusion Diagnosis Perspective on Cloud Computing -- <b>Part IV: Research Automation, Reusability, Reproducibility and Repeatability -- </b>Conventional Workflow Technology for Scientific Simulation -- Facilitating E-Science Discovery Using Scientific Workflows on the Grid -- Concepts and Algorithms of Mapping Grid-Based Workflows to Resources Within an SLA Context -- Orchestrating e-Science with the Workflow Paradigm -- <b>Part V: e-Science: Easy Science -- </b>Face Recognition using Global and Local Salient Features -- OGSA-Based SOA for Collaborative Cancer Research -- e-Science.</p>.
<p>The way in which scientific research is carried out is undergoing a series of radical changes, worldwide, as a result of the digital revolution. However, this “Science 2.0” requires a comprehensive supporting cyber-infrastructure.</p><p>This essential guidebook on e-science presents real-world examples of practices and applications, demonstrating how a range of computational technologies and tools can be employed to build essential infrastructures supporting next-generation scientific research. Each chapter provides introductory material on core concepts and principles, as well as descriptions and discussions of relevant e-science methodologies, architectures, tools, systems, services and frameworks. The guide’s explanations and context present a broad spectrum of different e-science system requirements.</p><p><b>Topics and features:</b></p><ul><li>Includes contributions from an international selection of preeminent e-science experts and practitioners</li><li>Discusses use of mainstream grid computing and peer-to-peer grid technology for “open” research and resource sharing in scientific research</li><li>Presents varied methods for data management in data-intensive research</li><li>Investigates issues of e-infrastructure interoperability, security, trust and privacy for collaborative research</li><li>Examines workflow technology for the automation of scientific processes, and that ensures the research can be reusable, reproducible and repeatable</li><li>Describes applications of e-science, highlighting systems used in the fields of biometrics, clinical medicine, and ecology</li></ul><p>This highly practical text/reference is a “must-have, must-use” resource for both IT professionals and academic researchers. Graduate students will also benefit from the experiences and viewpoints shared by the authors on this important subject, as well as the instructional nature of this guidebook.</p><p><b>Dr. Xiaoyu Yang</b> is a research engineer in the School of Electronics and Computer Science at the University of Southampton, UK. <b>Dr. Lizhe Wang</b> is a research scientist in the Pervasive Technology Institute at Indiana University, Bloomington, IN, USA. <b>Dr. Wei Jie</b> is a lecturer in the School of Computing at Thames Valley University, London, UK.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9780857294395
Subject: Computer science.
Information systems.
Computer science.
Information Systems and Communication Service.
COMPUTER APPLICATIONS.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <p><b>Part I: Sharing and Open Research -- </b>Implementing a Grid / Cloud e-Science Infrastructure for Hydrological Sciences -- The German Grid Initiative -- Democratizing Resource-Intensive e-Science Through Peer-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research -- <b>Part II: Data-Intensive e-Science -- </b>A Multi-Disciplinary, Model-Driven, Distributed Science Data System Architecture -- An Integrated Ontology Management and Data Sharing Framework for Large-Scale Cyberinfrastructure -- <b>Part III: Collaborative Research -- </b>An e-Science Cyberinfrastructure for Solar-enabled Water Production and Recycling -- e-Science Infrastructure Interoperability Guide -- Trustworthy Distributed Systems Through Integrity-Reporting -- An Intrusion Diagnosis Perspective on Cloud Computing -- <b>Part IV: Research Automation, Reusability, Reproducibility and Repeatability -- </b>Conventional Workflow Technology for Scientific Simulation -- Facilitating E-Science Discovery Using Scientific Workflows on the Grid -- Concepts and Algorithms of Mapping Grid-Based Workflows to Resources Within an SLA Context -- Orchestrating e-Science with the Workflow Paradigm -- <b>Part V: e-Science: Easy Science -- </b>Face Recognition using Global and Local Salient Features -- OGSA-Based SOA for Collaborative Cancer Research -- e-Science.</p>.
Physical Description: XXVII, 538p. 222 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-0-85729-439-5
Publication Date: 2011.


Title: From P2P and Grids to Services on the Web Evolving Distributed Communities / edited by Ian J. Taylor, Andrew B. Harrison.
Computer Communications and Networks,
Computer communications and networks,

Author: Taylor, Ian J.
Harrison, Andrew B.
SpringerLink (Online service)

General Notes: <P>Part 1: Common Themes -- Introduction -- Discovery Protocols -- Structured Document Types -- Distributed Security Techniques -- Part 2: Distributed Environments -- The Web -- Peer-2-Peer Environments -- Web Services -- Distributed Objects and Agent Technologies -- Grid Computing -- On the Horizon -- Part 3: Protocols and Architectures I: P2P Applications -- Gnutella -- Scalability -- Freenet -- Bittorrent.-Part 4: Protocols and Architectures II: Middleware -- Jini -- Jxta -- Web Services Protocols -- OGSA -- Web 2.0 -- Part 5: Deployment -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- Web Deployment Using Atom -- A: Want to Find More? -- B: RSA Algorithm</P>.
<P>Internet usage has evolved from a predominately client/server-based Web server interaction to additionally involving the use of more decentralized applications – through which users contribute more equally in the role of the application as a whole - and still further to distributed communities based around the Web.</P> <P>This broad-ranging new edition of a classic textbook/reference provides a comprehensive overview of emerging distributed-systems technologies and has been significantly enhanced and extended to cover the many new, state-of-the-art infrastructures and technologies that have since appeared. The focus is also broadened, retaining the technical aspects, but additionally including useful historical contexts for each of the technologies.</P> <P>Features:</P> <P>• Fills in the gaps and includes an additional 8 chapters on highly popular developments, including BitTorrent, Web Services specifications and Web 2.0, as well as the underlying technologies used by these</P> <P>• Includes helpful learning tools to aid the reader’s understanding, such as a thorough foundational introduction, end-of-chapter conclusions, and pointers to online information for further reading, etc.</P> <P>• Offers a more applied approach, with a comprehensive representation of the distributed systems field</P> <P>• Describes various possible communication methods from history and the basic connectivity</P> <P>• Presents a unique combination of P2P, Web services and grid technologies discussion that is both in-depth and accessible</P> <P>• Provides additional helpful info at www.p2pgridbook.com</P> <P>This easy-to-follow textbook/reference retains the detailed aspects of the successful first edition and is now substantially expanded, providing the reader with a comprehensive context in which to consider the most advanced and broad-ranging distributed systems available today. It is an essential reference text for designing new distributed systems, offering invaluable insight to both students and researchers.</P> <P>Ian J. Taylor is a senior lecturer in the School of Computer Science at Cardiff University, teaching two Distributed Systems courses. He holds an adjunct assistant professorship at Louisiana State University and consults independently with the Naval Research Lab in Washington, D.C. Andrew Harrison is a research fellow/associate, also in the School of Computer Science at Cardiff University.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848001237
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Information systems.
Computer science.
Computer Communication Networks.
Information Systems and Communication Service.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Part 1: Common Themes -- Introduction -- Discovery Protocols -- Structured Document Types -- Distributed Security Techniques -- Part 2: Distributed Environments -- The Web -- Peer-2-Peer Environments -- Web Services -- Distributed Objects and Agent Technologies -- Grid Computing -- On the Horizon -- Part 3: Protocols and Architectures I: P2P Applications -- Gnutella -- Scalability -- Freenet -- Bittorrent.-Part 4: Protocols and Architectures II: Middleware -- Jini -- Jxta -- Web Services Protocols -- OGSA -- Web 2.0 -- Part 5: Deployment -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- Web Deployment Using Atom -- A: Want to Find More? -- B: RSA Algorithm</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-123-7
Publication Date: 2009.


Title: From P2P and Grids to Services on the Web Evolving Distributed Communities / edited by Ian J. Taylor, Andrew B. Harrison.
Computer Communications and Networks,
Computer communications and networks,

Author: Taylor, Ian J.
Harrison, Andrew B.
SpringerLink (Online service)

General Notes: <P>Part 1: Common Themes -- Introduction -- Discovery Protocols -- Structured Document Types -- Distributed Security Techniques -- Part 2: Distributed Environments -- The Web -- Peer-2-Peer Environments -- Web Services -- Distributed Objects and Agent Technologies -- Grid Computing -- On the Horizon -- Part 3: Protocols and Architectures I: P2P Applications -- Gnutella -- Scalability -- Freenet -- Bittorrent.-Part 4: Protocols and Architectures II: Middleware -- Jini -- Jxta -- Web Services Protocols -- OGSA -- Web 2.0 -- Part 5: Deployment -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- Web Deployment Using Atom -- A: Want to Find More? -- B: RSA Algorithm</P>.
<P>Internet usage has evolved from a predominately client/server-based Web server interaction to additionally involving the use of more decentralized applications – through which users contribute more equally in the role of the application as a whole - and still further to distributed communities based around the Web.</P> <P>This broad-ranging new edition of a classic textbook/reference provides a comprehensive overview of emerging distributed-systems technologies and has been significantly enhanced and extended to cover the many new, state-of-the-art infrastructures and technologies that have since appeared. The focus is also broadened, retaining the technical aspects, but additionally including useful historical contexts for each of the technologies.</P> <P>Features:</P> <P>• Fills in the gaps and includes an additional 8 chapters on highly popular developments, including BitTorrent, Web Services specifications and Web 2.0, as well as the underlying technologies used by these</P> <P>• Includes helpful learning tools to aid the reader’s understanding, such as a thorough foundational introduction, end-of-chapter conclusions, and pointers to online information for further reading, etc.</P> <P>• Offers a more applied approach, with a comprehensive representation of the distributed systems field</P> <P>• Describes various possible communication methods from history and the basic connectivity</P> <P>• Presents a unique combination of P2P, Web services and grid technologies discussion that is both in-depth and accessible</P> <P>• Provides additional helpful info at www.p2pgridbook.com</P> <P>This easy-to-follow textbook/reference retains the detailed aspects of the successful first edition and is now substantially expanded, providing the reader with a comprehensive context in which to consider the most advanced and broad-ranging distributed systems available today. It is an essential reference text for designing new distributed systems, offering invaluable insight to both students and researchers.</P> <P>Ian J. Taylor is a senior lecturer in the School of Computer Science at Cardiff University, teaching two Distributed Systems courses. He holds an adjunct assistant professorship at Louisiana State University and consults independently with the Naval Research Lab in Washington, D.C. Andrew Harrison is a research fellow/associate, also in the School of Computer Science at Cardiff University.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848001237
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Information systems.
Computer science.
Computer Communication Networks.
Information Systems and Communication Service.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Part 1: Common Themes -- Introduction -- Discovery Protocols -- Structured Document Types -- Distributed Security Techniques -- Part 2: Distributed Environments -- The Web -- Peer-2-Peer Environments -- Web Services -- Distributed Objects and Agent Technologies -- Grid Computing -- On the Horizon -- Part 3: Protocols and Architectures I: P2P Applications -- Gnutella -- Scalability -- Freenet -- Bittorrent.-Part 4: Protocols and Architectures II: Middleware -- Jini -- Jxta -- Web Services Protocols -- OGSA -- Web 2.0 -- Part 5: Deployment -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- Web Deployment Using Atom -- A: Want to Find More? -- B: RSA Algorithm</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-123-7
Publication Date: 2009.


Title: Privacy and Security for Cloud Computing edited by Siani Pearson, George Yee.
Computer Communications and Networks,
Computer communications and networks,

Author: Pearson, Siani. editor.
Yee, George. editor.
SpringerLink (Online service)

General Notes: Part I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing.
Despite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447141891
Subject: Computer science.
Operating systems (Computers).
Computer system performance.
Computer network architectures.
Information systems.
Computer science.
Computer System Implementation.
System Performance and Evaluation.
Performance and Reliability.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing.
Physical Description: XVI, 306 p. 69 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4189-1
Publication Date: 2013.


Title: Privacy and Security for Cloud Computing edited by Siani Pearson, George Yee.
Computer Communications and Networks,
Computer communications and networks,

Author: Pearson, Siani. editor.
Yee, George. editor.
SpringerLink (Online service)

General Notes: Part I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing.
Despite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447141891
Subject: Computer science.
Operating systems (Computers).
Computer system performance.
Computer network architectures.
Information systems.
Computer science.
Computer System Implementation.
System Performance and Evaluation.
Performance and Reliability.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing.
Physical Description: XVI, 306 p. 69 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4189-1
Publication Date: 2013.


Title: Guide to Computer Network Security by Joseph Migga Kizza.
Computer Communications and Networks,
Computer communications and networks,

Author: Kizza, Joseph Migga. author.
SpringerLink (Online service)

General Notes: Part I: Understanding Traditional Computer Network Security -- Computer Network Fundamentals -- Understanding Computer Network Security -- Part II: Security Challenges to Traditional Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and  Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network – Virtualization, Cloud Computing and Mobile Systems -- Mobile Communication Systems and Related Security Issues -- Virtualization Infrastructure and Related Security Issues -- Cloud Computing and Related Security Issues -- Other Efforts to Secure Information and Computer Networks -- Part V: Hands-On Projects -- Hands-On Projects.
With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before. This comprehensive and authoritative Guide to Computer Network Security exposes the various security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this much-anticipated new edition embraces a broader view of computer networks that encompasses new agile mobile systems and social networks. Topics and features: Provides supporting material for lecturers and students at an associated website, including an instructor’s manual, slides, solutions, and laboratory materials Includes both quickly-workable questions and more thought-provoking advanced exercises at the end of each chapter Devotes an entire chapter to laboratory exercises, offering both weekly and semester-long assignments, and hard open research projects Surveys known security threats, and discusses flaws and vulnerabilities in computer network infrastructures and protocols Reviews existing best practices, proposes practical and efficient solutions to security issues, and encourages readers to investigate alternative possible approaches Explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security Examines the impact of developments in virtualization, cloud computing, and mobile systems, which have extended the boundaries of the traditional computer network This unique text/reference is an essential instructional and research tool for undergraduates in computer science and engineering. It is also a valuable reference for practitioners involved in computer networks and data security.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447145431
Subject: Computer science.
Computer Communication Networks.
Information storage and retrieval systems.
Information systems.
Computer science.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 2nd ed. 2013.
Contents: Part I: Understanding Traditional Computer Network Security -- Computer Network Fundamentals -- Understanding Computer Network Security -- Part II: Security Challenges to Traditional Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and  Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network – Virtualization, Cloud Computing and Mobile Systems -- Mobile Communication Systems and Related Security Issues -- Virtualization Infrastructure and Related Security Issues -- Cloud Computing and Related Security Issues -- Other Efforts to Secure Information and Computer Networks -- Part V: Hands-On Projects -- Hands-On Projects.
Physical Description: XXIV, 521 p. 106 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4543-1
Publication Date: 2013.


Title: Guide to Computer Network Security by Joseph Migga Kizza.
Computer Communications and Networks,
Computer communications and networks,

Author: Kizza, Joseph Migga. author.
SpringerLink (Online service)

General Notes: Part I: Understanding Traditional Computer Network Security -- Computer Network Fundamentals -- Understanding Computer Network Security -- Part II: Security Challenges to Traditional Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and  Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network – Virtualization, Cloud Computing and Mobile Systems -- Mobile Communication Systems and Related Security Issues -- Virtualization Infrastructure and Related Security Issues -- Cloud Computing and Related Security Issues -- Other Efforts to Secure Information and Computer Networks -- Part V: Hands-On Projects -- Hands-On Projects.
With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before. This comprehensive and authoritative Guide to Computer Network Security exposes the various security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this much-anticipated new edition embraces a broader view of computer networks that encompasses new agile mobile systems and social networks. Topics and features: Provides supporting material for lecturers and students at an associated website, including an instructor’s manual, slides, solutions, and laboratory materials Includes both quickly-workable questions and more thought-provoking advanced exercises at the end of each chapter Devotes an entire chapter to laboratory exercises, offering both weekly and semester-long assignments, and hard open research projects Surveys known security threats, and discusses flaws and vulnerabilities in computer network infrastructures and protocols Reviews existing best practices, proposes practical and efficient solutions to security issues, and encourages readers to investigate alternative possible approaches Explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security Examines the impact of developments in virtualization, cloud computing, and mobile systems, which have extended the boundaries of the traditional computer network This unique text/reference is an essential instructional and research tool for undergraduates in computer science and engineering. It is also a valuable reference for practitioners involved in computer networks and data security.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447145431
Subject: Computer science.
Computer Communication Networks.
Information storage and retrieval systems.
Information systems.
Computer science.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 2nd ed. 2013.
Contents: Part I: Understanding Traditional Computer Network Security -- Computer Network Fundamentals -- Understanding Computer Network Security -- Part II: Security Challenges to Traditional Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and  Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network – Virtualization, Cloud Computing and Mobile Systems -- Mobile Communication Systems and Related Security Issues -- Virtualization Infrastructure and Related Security Issues -- Cloud Computing and Related Security Issues -- Other Efforts to Secure Information and Computer Networks -- Part V: Hands-On Projects -- Hands-On Projects.
Physical Description: XXIV, 521 p. 106 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4543-1
Publication Date: 2013.


Title: Information assurance : surviving the information environment / Andrew Blyth and Gerald L. Kovacich.
Computer communications and networks

Author: Blyth, Andrew, 1966-
Kovacich, Gerald L.

General Notes: Includes bibliographical references (p. [289]-329) and index.
Publisher: Springer
Publication Place: New York :
ISBN: 185233326X
Subject: Computer security.
Data protection.

Series: Computer communications and networks
Physical Description: xiii, 337 p. : ill. ;
Publication Date: 2001.


Title: Computer communications and networks / John R. Freer.
Computer systems series (Pitman)

Author: Freer, John R.
General Notes: Includes index., Includes index.
Publisher: Pitman,
Publication Place: London :
ISBN: 0273027891 (pbk) :
Subject: Computer networks.
Series: Computer systems series (Pitman)
Physical Description: xi, 432 pages : illustrations ;
Publication Date: 1988.


Title: Computer communications and networks. / John R. Freer.
Author: Freer , John R.
Publisher: Plenum Press,
Publication Place: New York:
ISBN: 8185336334
Subject: Computer Networks
Physical Description: 432p.
Publication Date: 1988.


Title: Computer companion for the VIC-20 / by Robert P. Haviland.
Author: Haviland, Robert P.
Publisher: Tab Books,
Publication Place: Blue Ridge Summit, PA. :
ISBN: 0830606130 (pbk.) :
Subject: Vic 20 (Computer)
Edition: 1st ed.
Physical Description: viii, 119 p. : ill. ;
Publication Date: c1983.


Title: Computer competencies needed by secondary teachers to be proficient using microcomputers in teaching James Lew Mcgill.
Author: McGill, James Lew.
General Notes: Thesis (Ph. D.) -- Kansas State University, 1988.
Includes bibliographical references (p. 119-126).
Online version available via Arabic Digital Library Data base-Yarmouk University.

Publisher: U.M.I.,
Publication Place: Ann Arbor :
Subject: Computers -- Study and teaching.
Microcomputers -- Study and teaching.

Dissertation Note: Thesis (Ph. D.) -- Kansas State University, 1988.
Physical Description: 1 online resource (iv, 109 pages) : PDF
Electronic Location: Abstract
Publication Date: 1988.


Title: Computer compilation of molecular weights and percentage compositions for organic compounds [by] Michael J. S. Dewar and Richard Jones.
Author: Dewar, Michael James Steuart.
Jones, Richard, 1936- joint author.

General Notes: In English, French, and German., In English, French, and German.
Publisher: Pergamon Press
Publication Place: Oxford, New York,
ISBN: 008012707X
Subject: Chemistry, Organic -- Tables.
Molecular weights -- Tables.

Edition: [1st ed.]
Physical Description: xxix, 476 p.
Publication Date: [1969]




Title: New perspectives on computer concepts : comprehensive / by June Jamrich Parsons and Dan Oja. Computer concepts
Computer concepts Computer concepts
New perspectives series Computer concepts

Author: Parsons, June Jamrich.
Oja, Dan.

General Notes: Accompanying BookOnCD contains the entire contents of the textbook with figures that come to life as videos, software tours, and animations. Includes also labs and computer-scored practice tests., Accompanying BookOnCD contains the entire contents of the textbook with figures that come to life as videos, software tours, and animations. Includes also labs and computer-scored practice tests.
Publisher: Thomson/Course Technology,
Publication Place: Boston, Mass. :
ISBN: 0619243619 (pbk.)
9780619243616 (pbk.)
0619213868 (instructors ed.)
9780619213862 (instructors ed.)

Subject: Electronic digital computers.
Electronic data processing.

Series: New perspectives series
Edition: 7th ed.
Physical Description: xlviii, 744 p. : ill. ; 1 CD-ROM (4 3/4 in.)
Publication Date: c2004.


Title: New perspectives on computer concepts : comprehensive/ by June Jamrich Parsons and Dan Oja.. Computer concepts
Computer concepts Computer concepts
New perspectives series Computer concepts

Author: Parsons,June Jamrich
Oja,Dan

General Notes: accompanied by 1 computer optical laser disc ; 4.75in., accompanied by 1 computer optical laser disc ; 4.75in.
Publisher: Thomson Course Technology,
Publication Place: Boston:
ISBN: 0619243619 (pbk)
Subject: Computers
Electronic digital computers
Electronic data processing

Series: New perspectives series
Edition: 7th
Physical Description: xlviii, 744 p.: ill.
Publication Date: 2004.


Title: New perspectives on computer concepts : comprehensive, 2011 / by June Jamrich Parsons and Dan Oja. Computer concepts
Computer concepts Computer concepts

Author: Parsons, June Jamrich.
Oja, Dan.

General Notes: Accompanying BookOnCD contains the entire contents of the textbook with figures that come to life as videos, software tours, and animations. Includes also labs and computer-scored practice tests., Accompanying BookOnCD contains the entire contents of the textbook with figures that come to life as videos, software tours, and animations. Includes also labs and computer-scored practice tests.
Publisher: Course Technology,
Publication Place: Boston, Mass. :
ISBN: 0538471468 (pbk.)
Subject: Computers.
Electronic digital computers.
Electronic data processing.

Edition: International ed.
Physical Description: xxiv, 804 p. : col. ill. ; 1 CD-ROM (4 3/4 in.)
Publication Date: c2010.




Title: Computer concepts : introductory / June Jamrich Parsons, Dan Oja.
New perspectives series
New perspectives on computer concepts.

Author: Parsons, June Jamrich.
Oja, Dan.
Parsons, June Jamrich. New perspectives on computer concepts.

General Notes: "A Susan Solomon book", "A Susan Solomon book"
Rev. ed. of New perspectives on computer concepts., "A Susan Solomon book"

Publisher: Course Technology, Inc.,
Publication Place: Cambridge, Mass. :
ISBN: 0760034397
9780760034392

Subject: Computer science.
Series: New perspectives series
Edition: 2nd ed.
Physical Description: 1 v. in various pagings : col. ill. ;
Publication Date: c1996.


Title: Computer concepts / June Jamrich Parsons, Dan Oja.
Illustrated series. Brief

Author: Parsons, June Jamrich.
Oja, Dan, Jo. Author.

General Notes: Includes index., Includes index.
Publisher: Course Technology/Cengage Learning,
Publication Place: Australia ; Boston, Mass. :
ISBN: 1423999320 (text)
9781423999324 (text)

Subject: Computer science.
Computer science -- Problems, exercises, etc.

Series: Illustrated series. Brief
Edition: 7th ed., illustrated, brief
Physical Description: xv, 144 p. : ill. ; 1 CD-ROM (4 3/4 in.)
Publication Date: 2009.


Title: Computer concepts & programming in basic : (with medical examples)/ Tarik al-obaidi ; Nidhal al-Alusi.
Author: Al-Obaidi, Tarik.
Nidhal al-Alusi.

Publisher: Al-Mustansiriyah University],
Publication Place: [Baghdad:
Subject: Computer science.
Physical Description: 176 p.
Publication Date: 1990.


Title: Computer concepts and programming in C / Naveen Rathor. Computer concepts & programming in C
Computer concepts & programming in C Computer concepts & programming in C

Author: Rathor, Naveen.
General Notes: Includes bibliographical references and index.
Publisher: Asian Book Private,
Publication Place: New Delhi :
ISBN: 9788184121209
Subject: Computer science
C (Computer program langauage)
Computers.

Edition: 2nd ed.
Physical Description: 404 p. : ill.
Publication Date: 2010


Title: Computer concepts : screen by screen / Jon Huhtala, George Novotny.
Author: Huhtala, Jon.
Novotny, George.

General Notes: Includes indexes., Includes indexes.
Publisher: Benjamin/Cummings Pub. Co.,
Publication Place: Redwood City, Calif. :
ISBN: 0805328238
0805328270 (cover)

Subject: Computers.
Electronic data processing.

Physical Description: 216 p. : ill. ;
Publication Date: c1991.




Title: Computer concepts and application for work efficiency / Ravinder Kumar.
Author: Kumar, Ravinder.
Publisher: Deep & deep puplications,
Publication Place: New delhi :
ISBN: 817100681X
Subject: Management information system.
Work -- efficieney -- computer application.

Edition: 1st ed.
Physical Description: 168 p.
Publication Date: 1995.


Title: Computer Concepts and Application For Work Efficiency / Ravinder Kumar.
Author: Kumar, Ravinder.
General Notes: Includes Index, Includes Index
ISBN: 817100681X
Subject: Computer Concepts.
Physical Description: 167 P. : Figuers ;


Title: Computer concepts and applications/ Donald H. Sanders.
Author: Sanders, Donald H.
Publisher: McGraw-Hill,
Publication Place: New York:
Subject: Computers.
Electronic data processing.

Physical Description: xxvi, 546 p. Illustration.
Publication Date: 1987.






Title: Computer concepts and C programming : a holistic approach to learning C / Basavaraj S. Anami, Shanmukhappa A. Angadi, Sunilkumar S. Manvi.
Author: Anami, Basavaraj S.
Manvi, Sunilkumar S. JT.AUTH.
Angadi, Shanmukhappa A. JT.AUTH.

General Notes: Includes bibliographical references and index.
Publisher: PHI Learning,
Publication Place: New Delhi :
ISBN: 9788120340671
Subject: C (Computer program language)
Computer science.
COMPUTER SCIENCE -- PROBLEMS, EXERCISES, ETC.

Edition: 2nd ed
Physical Description: 328 p. : ill.
Publication Date: 2010


Title: COMPUTER CONCEPTS AND PROGRAMMING IN BASIC/ TARIK AL-OBAIDI
Author: TARIK AL-OBAIDI
Nidhal al-Alusi WRITER ASS.

Publisher: (S.N),
Publication Place: (S.I):
Subject: Computer programs
Physical Description: 175 p.
Publication Date: 1990


Title: Computer concepts and programming in C / Naveen Rathor. Computer concepts & programming in C
Computer concepts & programming in C Computer concepts & programming in C

Author: Rathor, Naveen.
General Notes: Includes bibliographical references and index.
Publisher: Asian Book Private,
Publication Place: New Delhi :
ISBN: 9788184121209
Subject: Computer science
C (Computer program langauage)
Computers.

Edition: 2nd ed.
Physical Description: 404 p. : ill.
Publication Date: 2010


Title: Computer concepts basics / Dolores Wells-Pusins, Ann Peele Ambrose.
Author: Pusins, Dolores Wells.
Ambrose, Ann Peele, 1949-

General Notes: Questions and answers, examples, and tests of basic skills explore and provide an overview of the world of computers.
Publisher: Course Technology,
Publication Place: Cambridge, Mass. :
ISBN: 0538695013
Subject: Computers -- Juvenile literature.
Computers -- Miscellanea.
Questions and answers.

Physical Description: p. cm.
Publication Date: 2001.


Title: Computer concepts for agribusiness / Michael W. Woolverton.
Author: Woolverton, Michael W.
General Notes: Includes bibliographies and index.
Publisher: AVI Pub. Co.,
Publication Place: Westport, Conn. :
ISBN: 0870555103 :
Subject: Agriculture -- Economic aspects -- Data processing.
Agricultural industries -- Data processing.

Physical Description: xiii, 311 p. : ill. ;
Publication Date: c1986.


Title: Computer concepts for agribusiness / Michael W. Woolverton.
Author: Woolverton, Michael W.
General Notes: Includes bibliographies and index.
Publisher: AVI Pub. Co.,
Publication Place: Westport, Conn. :
ISBN: 0870555103 :
9780870555107

Subject: Agriculture -- Economic aspects -- Data processing.
Agricultural industries -- Data processing.
Agriculture -- Aspect âeconomique -- Informatique.
Industries agricoles -- Informatique.

Physical Description: xiii, 311 p. : ill. ;
Publication Date: c1986.


Title: Computer confluence : exploring tomorrow's technology / George Beekman.
Author: Beekman, George.
General Notes: Previous ed.: 2003., Previous ed.: 2003.
Includes index., Previous ed.: 2003.

Publisher: Pearson/Prentice Hall ; Pearson Education,
Publication Place: Upper Saddle River, N.J. : [Great Britain] :
ISBN: 0131273132 (pbk.)
Subject: Computers.
Information technology.
BUSINESS -- COMPUTER NETWORK RESOURCES.
Business -- Data processing.

Edition: 6th ed., comprehensive.
Physical Description: xxx, 600 p. : ill. (chiefly col.), ports. (some col.) ;
Publication Date: c2005.


Title: Computer confluence : exploring tomorrow's technology / George Beekman.
Author: Beekman, George.
General Notes: Includes bibliographical references and index.
System requirements for accompanying computer disc: Windows 95, 98, NT4 or 2000. 16 MGB RAM; Macintosh system requirements: Power PC; System 7.5.3 or later; 16 MGB RAM.

Publisher: Prentice Hall,
Publication Place: Upper Saddle River, NJ :
ISBN: 0130882372
Subject: Computers.
Information technology.

Edition: 4th ed.
Physical Description: xxiv, 507 p. : col. ill. ; 1 computer optical disc (4 3/4 in.)
Publication Date: 2001.


Title: Computer confluence : exploring tomorrow's technology / George Beekman.
Author: Beekman, George.
Publisher: Prentice Hall,
Publication Place: Upper Saddle River, N.J. :
ISBN: 0130661880
Subject: Computers.
Information technology.

Edition: Standard ed., 5th ed.
Physical Description: xxix, 511 p. : ill. (some col.) ;
Publication Date: 2003.


Title: Computer confluence : exploring tomorrow's technology. Business edition / George Beekman, Eugene J. Rathswohl.
Author: Beekman, George.
Rathswohl, Eugene J.

General Notes: Includes bibliographical references and index.
Publisher: Prentice Hall,
Publication Place: Upper Saddle River, NJ :
ISBN: 0130909246
9780130909244

Subject: Computers.
Information technology.

Edition: 3rd ed.
Physical Description: xxxiv, 563 p. : col. ill. ; + 1 CD-ROM (4 3/4 in.)
Publication Date: 2001.


Title: Computer confluence : tomorrow's technology and you : introductory / George Beekman, Michael J. Quinn.
Author: Beekman, George.
Quinn, Michael J. (Michael Jay) , Jo. Author.

General Notes: Previous eds. had subtitle: "exploring tomorrow's technology", Previous eds. had subtitle: "exploring tomorrow's technology"
Index: p.477-456., Previous eds. had subtitle: "exploring tomorrow's technology"

Publisher: Pearson/Prentice Hall,
Publication Place: Upper Saddle River, N.J. :
ISBN: 0131525301
9780131525306
013196867X (International ed.)
9780131968677 (International ed.)

Subject: Computers.
Information technology.
BUSINESS -- COMPUTER NETWORK RESOURCES.
Business -- Data processing.

Edition: 7th ed.
Physical Description: xxiii, 456 p. : ill. (chiefly col.), ports. (some col.) ; 1 CD - ROM
Publication Date: 2005.


Title: The computer connection : general ledger and practice sets for introductory accounting / Gregory W. Bischoff, John W. Wanlass.
Introduction to college accounting.

Author: Bischoff, Gregory W.
Wanlass, John W.
Bischoff, Gregory W. Introduction to college accounting.

General Notes: Computer disk: Version 1.0A., Computer disk: Version 1.0A.
System requirements: IBM PC, IBM XT, or IBM AT with 360KB drive; 1 double-sided, double-density disk drive; IBM PC DOS 1.1 or higher; 128 K RAM of memory., Computer disk: Version 1.0A.
To accompany: Introduction to college accounting / Gregory W. Bischoff, or other introductory text., Computer disk: Version 1.0A.

Publisher: Harcourt Brace Jovanovich,
Publication Place: San Diego :
ISBN: 0155126318
Subject: Accounting -- Data processing -- Study and teaching.
Accounting -- Study and teaching.
Accounting -- Computer programs.

Edition: IBM PC version.
Physical Description: iv, 88, 66 p. : ill., forms ; 1 computer disk (5 1/4 in.)
Publication Date: c1988.


Title: Computer connection mysteries solved / Graham Wideman and Michael Kern.
Author: Wideman, Graham.
Kern, Michael.

Publisher: H.W. Sams,
Publication Place: Indianapolis, IN :
ISBN: 0672225263 (pbk.) :
Subject: Microcomputers -- Amateurs' manuals.
Edition: 1st ed.
Physical Description: viii, 262 p. : ill. ;
Publication Date: c1986.


Title: COMPUTER CONSCIOUSNES: SURVIVING THE AUFOMATED 80S/ H.DOMINIC COVVEY
ADDISON-WESLEY SERIES JOY OF COMPUTING

Author: COVVEY,H.DOMINIC
MCALISTER, NEIL HARDING WRITER ASS.

Publisher: ADDISON WELEY PUBLISHING COMPANY,1980,
Publication Place: LONDON:
Subject: Computers
Series: ADDISON-WESLEY SERIES JOY OF COMPUTING
Physical Description: 212 p.
Publication Date: 1980


Title: The computer continuum / Kurt F. Lauckner & Mildred D. Lintner.
Author: Lauckner, Kurt F.
General Notes: Includes bibliographical references and index.
Publisher: Que E&T,
Publication Place: Indianapolis, IN :
ISBN: 1580760597 (pbk.)
Subject: Computer science.
Physical Description: 1 v. (various pagings) : ill. (some col.) ;
Publication Date: c1999.


Title: The computer continuum / Kurt F. Lauckner, Mildred D. Lintner.
Author: Lauckner, Kurt F.
Lintner, Mildred D.

General Notes: Includes bibliographical references and index.
Publisher: Prentice Hall,
Publication Place: Upper Saddle River, NJ :
ISBN: 0130898139
Subject: Computer science.
Edition: 2nd ed.
Physical Description: xxi, 489 p. : col. ill. ;
Publication Date: 2001.


Title: COMPUTER CONTRACTS AN INTERNATIONAL GUIDE TO AGREEMENTS AND SOFTWARE PROTECTION/ HILARY E. PEARSON
Author: PEARSON,HILARY E.
Publisher: KLUWER LAW AND TAXACION PUB,
Publication Place: DEVENTER:
Subject: Business -- Data processing
Physical Description: 298 p.
Publication Date: 1984


Title: Computer control and audit : a total systems approach / John G. Burch, Jr., Joseph L. Sardinas, Jr.
Author: Burch, John G.
Sardinas, Joseph L., joint author.

General Notes: "A Wiley/Hamilton publication.", "A Wiley/Hamilton publication."
Publisher: Wiley,
Publication Place: Santa Barbara [Calif.] :
ISBN: 0471034916
Subject: Electronic data processing departments -- Auditing.
Auditing -- Data processing.

Physical Description: xvi, 492 p. : ill. ;
Publication Date: c1978.


Title: Computer control in process industries/ E. I. Lowe ; A. E. Hidden.
IEE monograph series

Author: Lowe, Edward Ivan.
A. E. Hidden.

Publisher: Peter Perefgrinus,
Publication Place: London:
Subject: Process control -- Data processing.
Series: IEE monograph series
Physical Description: xii, 285 p. Illustration.
Publication Date: 1971.


Title: COMPUTER CONTROL OF INDUSTRIAL PROCESSES
Control engineering;

Author: Bennett, S Editor
Publisher: PETER PEREGRINUS,
Publication Place: LONDON:
Subject: Automation
Series: Control engineering; 21
Physical Description: 208 p.
Publication Date: 1984


Title: Computer control of industrial processes / editors, S. Bennett & D.A. Linkens.
IEE control engineering series ;

Author: Bennett, S. (Stuart)
Linkens, D. A.
Institution of Electrical Engineers.

General Notes: Includes bibliographical references and index.
Publisher: Peter Peregrinus on behalf of the Institution of Electrical Engineers,
Publication Place: London ; New York :
ISBN: 090604880X (pbk.)
Subject: Process control -- Data processing.
Series: IEE control engineering series ; 21
Physical Description: xiv, 208 p. : ill. ;
Publication Date: c1982.




Title: Computer control of manufacturing systems / Yoram Koren.
Author: Koren, Yoram.
General Notes: Includes bibliographies and index.
Publisher: McGraw-Hill,
Publication Place: New York :
ISBN: 0070353417 :
Subject: Production engineering -- Data processing.
Machine-tools -- Numerical control.
Robots, Industrial.

Physical Description: xvi, 287 p. : ill. ;
Publication Date: c1983.


Title: Computer control of manufacturing systems / Yoram Koren.
Author: Koren, Yoram.
General Notes: Includes bibliographies and index.
Publisher: McGraw-Hill,
Publication Place: New York :
ISBN: 0070353417 :
Subject: Production engineering -- Data processing.
Machine-tools -- Numerical control.
Robots, Industrial.

Physical Description: xvi, 287 p. : ill. ;
Electronic Location: http://www.loc.gov/catdir/toc/fy0712/82014950.html
Publication Date: c1983.


Title: Computer control of manufacturing systems / Yoram Koren.
Author: Koren, Yoram.
General Notes: Includes bibliographical references.
Publisher: McGraw-Hill,
Publication Place: London ; Paris ; Sydney :
ISBN: 0070663793
9780070663794

Subject: Production engineering -- Data processing.
Machine-tools -- Numerical control.
Robots, Industrial.
Machine-tools -- Numerical control.
Production engineering -- Data processing.
Robots, Industrial.

Edition: International student ed.
Physical Description: 287 pages : illustrations ;
Publication Date: 1983.


Title: Computer control of processes / M. Chidambaram.
Author: Chidambaram, M.
General Notes: Includes bibliographical references and index.
Publisher: Alpha Science International,
Publication Place: Oxford :
ISBN: 0849310105
9780849310102
1842650637
9781842650639

Subject: Digital control systems.
Physical Description: xiii, 284 p. : ill. ;
Electronic Location: http://www.loc.gov/catdir/enhancements/fy0646/2005363125-d.html
Publication Date: c2002, reprint 2008.


Title: Computer control of real-time processes / edited by S. Bennett and G.S. Virk.
IEE control engineering series ;
IEE control engineering series ;

Author: Bennett, S. (Stuart)
Virk, G. S. (Gurvinder S.)

General Notes: Includes bibliographical references and index.
Discrete controller design / J.R. Leigh -- Multivariable control system design / G.S. Virk -- Automatic tuning of commercial PID controllers / P.J. Gawthrop -- Practical aspects of implementing PID controllers / L.S. Smith -- Generating sequences for control / R.M. Henry -- Real-time computer networking / G.C. Barney -- Parallel processing for computer control / G.S. Virk -- Design of software for real-time system / S. Bennett -- Real-time software using MASCOT / N. Mort -- Software fault tolerance / S. Bennett -- An OOD methodology for shop floor control systems / N.K. Stanley -- Modelling, simulation and control of direct fired liquid gas vaporisers / A. Lees -- Computer control for patient care / D.A. Linkens -- Robot control / A.S. Morris -- Active control of a modern fighter aircraft / D. McLean -- Batch process control / J.D.F. Wilkie -- DDC in the process industries / D.J. Sandoz.

Publisher: P. Peregrinus Ltd. on behalf of the Institution of Electrical Engineers,
Publication Place: London, U.K. :
ISBN: 0863412203
9780863412202

Subject: Process control -- Data processing.
Automatic control -- Data processing.
Real time control.
Control systems Applications of computer systems

Series: IEE control engineering series ; 41
IEE control engineering series ; v. 41.

Contents: Discrete controller design / J.R. Leigh -- Multivariable control system design / G.S. Virk -- Automatic tuning of commercial PID controllers / P.J. Gawthrop -- Practical aspects of implementing PID controllers / L.S. Smith -- Generating sequences for control / R.M. Henry -- Real-time computer networking / G.C. Barney -- Parallel processing for computer control / G.S. Virk -- Design of software for real-time system / S. Bennett -- Real-time software using MASCOT / N. Mort -- Software fault tolerance / S. Bennett -- An OOD methodology for shop floor control systems / N.K. Stanley -- Modelling, simulation and control of direct fired liquid gas vaporisers / A. Lees -- Computer control for patient care / D.A. Linkens -- Robot control / A.S. Morris -- Active control of a modern fighter aircraft / D. McLean -- Batch process control / J.D.F. Wilkie -- DDC in the process industries / D.J. Sandoz.
Physical Description: xiii, 306 p. : ill. ;
Publication Date: c1990.


Title: Computer-controlled industrial machines, processes, and robots / James A. Gupton, Jr.
Author: Gupton, James A.
General Notes: Includes bibliographies and index.
Publisher: Prentice-Hall,
Publication Place: Englewood Cliffs, N.J. :
ISBN: 0131652672
Subject: Manufacturing processes -- Data processing.
Physical Description: xvi, 359 p. : ill. ;
Publication Date: c1986.


Title: COMPUTER-CONTROLLED INDUSTRIAL MACHINES,PROCESSES,AND ROBORTS/ JAMES A. GUPTON
Author: GUPTON,JAMES A.
Publisher: PRENTICE-HALL,
Publication Place: NEWJERSEY:
Subject: MANUFACTURES -- DATA PROCESSING
Physical Description: 350 p.
Publication Date: 1986




Title: Computer controlled systems : theory and applications / by George A. Perdikaris.
International series on microprocessor-based systems engineering ;

Author: Perdikaris, George A.
General Notes: Includes bibliographical references (p. [461]-463) and index.
Publisher: Kluwer Academic Publishers,
Publication Place: Dordrecht ; Boston :
ISBN: 0792314220
9780792314226 (acid-free paper)

Subject: Automatic control.
Microprocessors.

Series: International series on microprocessor-based systems engineering ; v. 8
Physical Description: x, 480 p. : ill. ;
Publication Date: c1991, reprinted with corrections 1996.


Title: Computer controlled systems : theory and design / Karl J. êAstrèom, Bjèorn Wittenmark.
Prentice Hall information and system sciences series

Author: êAstrèom, Karl J. (Karl Johan), 1934-
Wittenmark, Bjèorn.

General Notes: Includes bibliographies and index.
Publisher: Prentice-Hall,
Publication Place: Englewood Cliffs, N.J. :
ISBN: 0131643193 :
Subject: Automatic control -- Data processing.
Series: Prentice Hall information and system sciences series
Physical Description: xv, 430 p. : ill. ;
Publication Date: c1984.


Title: Computer-controlled systems : theory and design / Karl J. êAstrèom, Bjèorn Wittenmark.
Prentice Hall information and system sciences series

Author: êAstrèom, Karl J. (Karl Johan), 1934-
Wittenmark, Bjèorn.

General Notes: Includes bibliographical references.
Publisher: Prentice Hall,
Publication Place: Englewood Cliffs, N.J. :
ISBN: 0131686003
0131727842 (pbk) :

Subject: Automatic control -- Data processing.
Automatic control Use of Computers

Series: Prentice Hall information and system sciences series
Edition: 2nd ed.
Physical Description: xvi, 544 p. : ill. ;
Publication Date: c1990.


Title: Computer-controlled systems : theory and design / Karl J. êAstrèom, Bjèorn Wittenmark.
Prentice Hall information and system sciences series

Author: êAstrèom, Karl J. (Karl Johan), 1934-
Wittenmark, Bjèorn.

General Notes: Includes bibliographical references (p. 537-548) and index.
Publisher: Prentice Hall,
Publication Place: Upper Saddle River, N.J. :
ISBN: 0133148998
Subject: Automatic control -- Data processing.
Series: Prentice Hall information and system sciences series
Edition: 3rd ed.
Physical Description: xiv, 557 p. : ill. ;
Publication Date: c1997.




Title: Computer corpus lexicography / Vincent B.Y. Ooi.
Edinburgh textbooks in empirical linguistics

Author: Ooi, Vincent, B. Y.
General Notes: Includes bibliographical references (p. [219]-239) and index.
Publisher: Edinburgh University Press,
Publication Place: Edinburgh :
ISBN: 0748609962 (cased)
074860815X (paperback)

Subject: Lexicology -- Data processing.
Lexicography -- Data processing.

Series: Edinburgh textbooks in empirical linguistics
Physical Description: x, 243 p. : ill. ;
Publication Date: c1998.


Title: Computer course (illustrated) Vishnu Priya Singh, Meenakshi Singh.
Asian computech book

Author: Singh, Vishnu P.
Singh, Meenakshi.
ebrary, Inc.

General Notes: Computer basics -- Operating systems -- Application software -- Networking, Internet and e-mail -- Accounting -- New OS and AS.
Electronic reproduction. Palo Alto, Calif. : ebrary, 2011. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.

Publisher: Computech Publications Ltd.,
Publication Place: New Delhi, India :
ISBN: 9788173171833
Subject: Computers.
Computer programs.
Computer software.
Electronic books.

Series: Asian computech book
Edition: 13th rev. ed.
Contents: Computer basics -- Operating systems -- Application software -- Networking, Internet and e-mail -- Accounting -- New OS and AS.
Physical Description: 576 p. : ill.
Electronic Location: http://site.ebrary.com/lib/excellence/Doc?id=10417569
Publication Date: 2010.


Title: Computer crime : techniques prevention / Geoffrey H. Wold , Robert F. Shriver.
Author: WOLD , Geoffrey H.
SHRIVER, Robert F. JT.AUTH

Publisher: Galgotia Pub,,
Publication Place: New Dehli:
ISBN: 8185623929
Subject: Computer crimes
Physical Description: xii , 254 p..
Publication Date: 1993.


Title: COMPUTER CRIME COMPUTER SECURITY TECHNIQUES/ U.S.DEPARTMENT OF JUSTICE
Author: U.S.DEPARTMENT OF JUSTICE
Publisher: (S.N),
Publication Place: (S.I):
Subject: Computer crimes
Computers

Physical Description: 200 p.
Publication Date: -198


Title: COMPUTER CRIME ELECTRONIC FUND TRANSFER SYSTEMS AND CRIME
U.S.DEPERATMENT OF JUSTICE BUREAU OF JUSTICE

Author: COLTON, KENT W Editor
Publisher: U.S.GOVERNMENT PRINTING OFFICE,
Publication Place: WASHINGTON:
Subject: Computer crimes
Series: U.S.DEPERATMENT OF JUSTICE BUREAU OF JUSTICE
Physical Description: 182 p.
Publication Date: 1982


Title: Computer crime, investigation, and the law William C. Easttom, Jeffrey Taylor ; [edited by] Heather Hurley.
Author: Easttom, William C.
Taylor, Jeffrey.
Hurley, Heather.
ebrary, Inc.

General Notes: Includes index., Includes index.
Publisher: Cengage Learning,
Publication Place: Boston, Mass. :
ISBN: 1435455320 (softcover : alk. paper)
9781435456105 (e-book)

Subject: Computer crimes.
Electronic books.

Edition: 1st Ed.
Physical Description: xvii, 499 p. : ill.
Electronic Location: http://site.ebrary.com/lib/excellence/Doc?id=10384007
Publication Date: 2010.


Title: Computer cryptology : beyond decoder rings / Karl Andreassen.
Author: Boyd, Waldo T.
General Notes: Includes index., Includes index.
Publisher: Prentice-Hall,
Publication Place: Englewood Cliffs, NJ :
ISBN: 0131661337 (pbk.) :
Subject: Cryptography -- Data processing.
Ciphers -- Data processing.

Physical Description: xv, 268 p. : ill. ;
Publication Date: c1988.


Title: Computer culture : the scientific, intellectual, and social impact of the computer / edited by Heinz R. Pagels.
Annals of the New York Academy of Sciences ;

Author: Pagels, Heinz R., 1939- editor.
New York Academy of Sciences.

General Notes: Papers presented at a symposium sponsored by the New York Academy of Sciences, held Apr. 5-8, 1983., Papers presented at a symposium sponsored by the New York Academy of Sciences, held Apr. 5-8, 1983.
Publisher: New York Academy of Sciences,
Publication Place: New York, N.Y. :
ISBN: 0897662458 (soft) :
089766244X (hard)

Subject: Computers -- Congresses.
Computers -- Congresses.
Ordinateurs -- Congrès.

Series: Annals of the New York Academy of Sciences ; v. 426
Physical Description: x, 288 p. : ill. ;
Publication Date: 1984.


Title: موسوعة الكمبيوتر : computer cyclopedia / اعداد و تجميع مادة علمية احمد خميس ...[واخ] . computer cyclopedia.
computer cyclopedia. computer cyclopedia.

Author: خميس، أحمد معد.
Publisher: دار ابن خلدون،
Publication Place: الاسكندرية :
Subject: الحاسوب.
Physical Description: مجلد : ايضاحيات ؛
Publication Date: 2008


Title: Computer data-base organization / James Martin.
Prentice-Hall series in automatic computation

Author: Martin, James
Publisher: Prentice-Hall,
Publication Place: London:
Subject: Data base managment
Series: Prentice-Hall series in automatic computation
Edition: 2nd ed.
Physical Description: 713p.
Publication Date: 1975.


Title: Computer data-base organization / James Martin.
Prentice-Hall series in automatic computation

Author: Martin, James, 1933-
General Notes: Includes bibliographical references and index.
Publisher: Prentice-Hall,
Publication Place: Englewood Cliffs, N.J. :
ISBN: 0131654233
Subject: Database management.
Series: Prentice-Hall series in automatic computation
Edition: 2d ed.
Physical Description: xviii, 713 p. : ill. ;
Publication Date: c1977.




Title: Computer data displays.
Prentice-Hall electrical engineering series

Author: Davis, Samuel, 1930-
General Notes: Includes bibliographies.
Publisher: Prentice-Hall
Publication Place: Englewood Cliffs, N.J.,
ISBN: 0131658786
Subject: Computer input-output equipment.
Information display systems.

Series: Prentice-Hall electrical engineering series
Physical Description: xiii, 379 p. illus.
Publication Date: [1969]