Skip to main content

Books in Computer communication networks

11-20 of 161 results in All results

Geographical and Fingerprinting Data for Positioning and Navigation Systems

  • 1st Edition
  • September 14, 2018
  • Jordi Conesa + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 3 1 8 9 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 3 1 9 0 - 9
Geographical and Fingerprinting Data for Positioning and Navigation Systems: Challenges, Experiences and Technology Roadmap explores the state-of-the -art software tools and innovative strategies to provide better understanding of positioning and navigation in indoor environments using fingerprinting techniques. The book provides the different problems and challenges of indoor positioning and navigation services and shows how fingerprinting can be used to address such necessities. This advanced publication provides the useful references educational institutions, industry, academic researchers, professionals, developers and practitioners need to apply, evaluate and reproduce this book’s contributions. The readers will learn how to apply the necessary infrastructure to provide fingerprinting services and scalable environments to deal with fingerprint data.

Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications

  • 1st Edition
  • August 21, 2018
  • Arun Kumar Sangaiah + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 3 3 1 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 3 3 2 7 - 9
Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications covers timely topics, including the neural network (NN), particle swarm optimization (PSO), evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS), etc. Furthermore, the book highlights recent research on representative techniques to elaborate how a data-centric system formed a powerful platform for the processing of cloud hosted multimedia big data and how it could be analyzed, processed and characterized by CI. The book also provides a view on how techniques in CI can offer solutions in modeling, relationship pattern recognition, clustering and other problems in bioengineering. It is written for domain experts and developers who want to understand and explore the application of computational intelligence aspects (opportunities and challenges) for design and development of a data-centric system in the context of multimedia cloud, big data era and its related applications, such as smarter healthcare, homeland security, traffic control trading analysis and telecom, etc. Researchers and PhD students exploring the significance of data centric systems in the next paradigm of computing will find this book extremely useful.

5G NR: The Next Generation Wireless Access Technology

  • 1st Edition
  • August 9, 2018
  • Erik Dahlman + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 4 3 2 4 - 7
5G NR: The Next Generation Wireless Access Technology follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR. After an initial discussion of the background to 5G, including requirements, spectrum aspects and the standardization timeline, all technology features of the first phase of NR are described in detail. Included is a detailed description of the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects and co-existence and interworking with LTE. The book provides a good understanding of NR and the different NR technology components, giving insight into why a certain solution was selected. Content includes: Key radio-related requirements of NR, design principles, technical features Details of basic NR transmission structure, showing where it has been inherited from LTE and where it deviates from it, and the reasons why NR Multi-antenna transmission functionality Detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information, random access and paging LTE/NR co-existence in the same spectrum, the benefits of their interworking as one system The different aspects of mobility in NR RF requirements for NR will be described both for BS and UE, both for the legacy bands and for the new mm-wave bands

Security in Network Functions Virtualization

  • 1st Edition
  • November 17, 2017
  • Zonghua Zhang + 1 more
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 2 5 7 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 2 3 7 1 - 6
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.

Mobile Cloud Computing

  • 1st Edition
  • September 8, 2017
  • Dijiang Huang + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 1 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 4 - 4
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

Computer and Information Security Handbook

  • 3rd Edition
  • May 10, 2017
  • John Vacca
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 3 8 4 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 9 2 9 - 8
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437

Securing the Internet of Things

  • 1st Edition
  • January 11, 2017
  • Shancang Li + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 5 - 3
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Optical Interconnects for Data Centers

  • 1st Edition
  • November 1, 2016
  • Tolga Tekin + 3 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 5 1 3 - 2
Current data centre networks, based on electronic packet switches, are experiencing an exponential increase in network traffic due to developments such as cloud computing. Optical interconnects have emerged as a promising alternative offering high throughput and reduced power consumption. Optical Interconnects for Data Centers reviews key developments in the use of optical interconnects in data centres and the current state of the art in transforming this technology into a reality. The book discusses developments in optical materials and components (such as single and multi-mode waveguides), circuit boards and ways the technology can be deployed in data centres. Optical Interconnects for Data Centers is a key reference text for electronics designers, optical engineers, communications engineers and R&D managers working in the communications and electronics industries as well as postgraduate researchers.

Peering Carrier Ethernet Networks

  • 1st Edition
  • October 19, 2016
  • Sachidananda Kangovi
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 3 1 9 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 2 4 9 - 1
Peering Carrier Ethernet Networks begins by providing background information on the evolution of important concepts and building blocks that have led to the current state of high bandwidth and high performance Ethernet technology in order to support current and emerging customer applications. The background information covered includes an overview of Public Switched Telephone Networks (PSTN) to describe circuit switching, multiplexing, and voice digitization that lead to the development of T1/T3 and SONET/SDH for transport. It interweaves these developments with changes in the regulatory regime. Additional coverage includes Carrier Ethernet networks' technical standards, which describe how service providers can offer services to off-net customers using peered Carrier Ethernet networks and a description of the taxonomy of customers and their current and emerging applications at Layer 2 and Layer 3 on peered Carrier Ethernet networks. The book concludes by describing next steps in Ethernet technology to meet growing demands and emerging trends.

Network Storage

  • 1st Edition
  • October 13, 2016
  • James O'Reilly
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 8 6 3 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 6 5 - 9
Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades. The book begins with an overview of the current state of storage and its evolution from the network perspective, looking closely at the different protocols and connection schemes and how they differentiate in use case and operational behavior. The book explores the software changes that are motivating this evolution, ranging from data management, to in-stream processing and storage in virtual systems, and changes in the decades-old OS stack. It explores Software-Defined Storage as a way to construct storage networks, the impact of Big Data, high-performance computing, and the cloud on storage networking. As networks and data integrity are intertwined, the book looks at how data is split up and moved to the various appliances holding that dataset and its impact. Because data security is often neglected, users will find a comprehensive discussion on security issues that offers remedies that can be applied. The book concludes with a look at technologies on the horizon that will impact storage and its networks, such as NVDIMMs, The Hybrid Memory Cube, VSANs, and NAND Killers.