Subscribe to our newsletter

Computer Systems Organization

View as
Sort by
Display per page

European Research Activities in Cloud Computing

What’s new in the European research and development area? Cloud computing is a provision model where whatever computing resource that can be thought of (machines, network, software solutions, applications) is provided as a service. This new paradigm has changed the center of gravity of computing in both the academic and industry en...

Internet Tomography

Internet tomography, introduced from basic principles through to techniques, tools and applications, is the subject of this book. The design of Internet Tomography Measurement Systems (ITMS) aimed at mapping the Internet performance profile spatially and temporally over paths between probing stations is a particular focus.The Inter...

User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks

The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible ...

Biometric Security

Modern biometrics delivers an enhanced level of security by means of a “proof of property”. The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion beca...

A Name To Exist

In the Iliad and the Odyssey, song IX, Ulysses chooses the anthroponomy “Nobody” to escape the Cyclops. This onomastic game operates on two levels of meaning: the first referring to the anthroponomical fact, and the second to the lexicon, more specifically, to the common name. Ahead of his time, Ulysses would have surfed the Intern...

Enhanced On-Demand Multipath Routing for Wireless Networks

The Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol is widely used in highly dynamic ad-hoc networks because of its generic features. The transmission of reliable energy efficient data is an emerging issue in AOMDV routing as the nodes are prone to link failures and route breaks in highly dynamic ad-hoc networks...

Selected Readings in Cybersecurity

This collection of papers highlights the current state of the art of cybersecurity. It is divided into five major sections: humans and information security; security systems design and development; security systems management and testing; applications of information security technologies; and outstanding cybersecurity technology de...

Second Generation Mainframes

Second Generation Mainframes: The IBM 7000 Series describes IBM’s second generation of mainframe computers which introduced new technology, new peripherals and advanced software. These systems were continuations of the instruction sets of the IBM 700 series with significant enhancements, but supported upwards compatibility that pre...

Ensuring Network Security through the Use of the Honeypot Technique

In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto the wrong path....

Blockchain in Data Analytics

Blockchain technology facilitates a decentralized database where business is rendered transparent without the involvement of middlemen. The first use of this technology was its application in digital currency (bitcoin). However, other potential uses of blockchain are yet to be explored. It is expected to have a major impact on cybe...

Global Mobility Management for Next Generation Networks

This book provides a fresh look at the most recent evolution of mobility management paradigms for next generation networks. It covers the basic principles of mobility management, its underlying technologies and environments, and the reasons for specific architectural design choices. The book serves to de-construct the way that mobi...

Fundamentals of Information and Communication Technologies

This book covers the basic issues and principles of information and communication technologies. It explains the key theories, techniques and applications of this field for both academic and professional audiences. Beginning with an overview of information and communication networks and architecture, the text explores information th...