You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Recent developments in computer communications and networks have enabled the deployment of exciting new areas such as Internet of Things and collaborative big data analysis. The design and implementation of energy efficient future generation communication and networking technologies also require the clever research and development of mobile, pervasive, and large-scale computing technologies. Advances in Computer Communications and Networks: from Green, Mobile, Pervasive Networking to Big Data Computing studies and presents recent advances in communication and networking technologies reflecting the state-of-the-art research achievements in novel communication technology and network optimization. Technical topics discussed in the book include: Data Center NetworksMobile Ad Hoc NetworksMultimedia NetworksInternet of ThingsWireless SpectrumNetwork Optimization.This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, electrical engineering and telecommunication systems.
This book constitutes the refereed proceedings of the Third IFIP-TC6 Networking Conference, NETWORKING 2004, held in Athens, Greece, in May 2004. The 103 revised full papers and 40 revised short papers were carefully reviewed and selected from 539 submissions. The papers are organized in topical sections on network security; TCP performance; ad-hoc networks; wavelength management; multicast; wireless network performance; inter-domain routing; packet classification and scheduling; services and monitoring; admission control; competition in networks; 3G/4G wireless systems; MPLS and related technologies; flow and congestion control; performance of IEEE 802.11; optical networks; TCP and congestion; key management; authentication and DOS prevention; energy aspects of wireless networks; optical network access; routing in ad-hoc networks; fault detection, restoration, and tolerance; QoS metrics, algorithms, and architecture; content distribution, caching, and replication; and routing theory and path computation.
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.
The 7th International Conference on Information Technology (CIT 2004) was held in Hyderabad, India, during December 20–23, 2004. The CIT 2004 was a forum where researchers from various areas of information technology and its applications could stimulate and exchange ideas on technological advancements. CIT, organizedby the Orissa InformationTechnologySociety (OITS), has emerged as one of the major international conferences in India and is fast becoming the premier forum for the presentation of the latest research and development in the critical area of information technology. The last six conferences attracted reputed researchers from around the world, and CIT 2004 took this trend forward....
Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of many established wireless networking concepts and protocols, and calls for developing new fundamenta...
This book constitutes the refereed proceedings of the 4th International IFIP-TC6 Networking Conference, NETWORKING 2005, held in Waterloo, Canada in May 2005. The 105 revised full papers and 36 posters were carefully reviewed and selected from 430 submissions. The papers are organized in topical sections on peer-to-peer networks, Internet protocols, wireless security, network security, wireless performance, network service support, network modeling and simulation, wireless LAN, optical networks, Internet performance and Web applications, ad-hoc networks, adaptive networks, radio resource management, Internet routing, queuing models, monitoring, network management, sensor networks, overlay multicast, QoS, wirless scheduling, multicast traffic management and engineering, mobility management, bandwith management, DCMA, and wireless resource management.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28–31, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), WINSYS (International Conference on Wireless Information Systems) and SIGMAP (Internation...
"This book provides research into parallel & distributed computing, high performance computing, and Grid computing"--Provided by publisher.
"Examines cyberspace threats and policies from the vantage points of China and the U.S"--