You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services. Cloud assembles large networks of virtual services, including hardware (CPU, storage, and network) and software resources (databases, message queuing systems, monitoring systems, and load-balancers). As Cloud continues to revolutionize applications in academia, industry, government, and many other fields, the transition to this efficient and flexible platform presents serious challenges at both theoretical and practical levels—ones that will often require new approaches and practices in all areas. Comprehensive and timely, Cloud ...
Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications. The pr...
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the des
A large portion of the network capacity of an ad hoc network can be wasted by the medium access mechanisms of omni-directional antennas. To overcome this problem, researchers propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput.
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing which contains a comprehensive overview, the latest pioneering work and future research direction of a research topic.
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
Increasingly, modern medicine relies on so called traditional or ancient medical knowledge. Holistic practices such as adhering to proper diet, observing rules for appropriate behavior, and administering medical preparations are coupled with the latest technology and methods to treat the whole patient. In light of this trend, there is much to be gained from understanding of one of the oldest medical systems still in existence. Tibetan Medicinal Plants provides you a detailed analysis of how Tibetan plants are used in this centuries old system. The book opens with a summary of Tibetan medicine and covers the various habitats in which the plants are found. The main part of this volume encompas...
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simul...
The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive