Skip to main content

Books in Computer systems organization

Showcasing hardware architecture, operating systems, and network infrastructure, this portfolio provides in-depth coverage of the fundamental building blocks of computing. Featuring cutting-edge research and practical insights, these titles support innovators, engineers, and students in designing efficient, scalable, and secure systems. Addressing emerging trends such as cloud computing, parallel processing, and hardware security, the collection fosters advancements that underpin modern digital infrastructure.

  • Wireless Public Safety Networks 2

    A Systematic Approach
    • 1st Edition
    • Daniel Camara + 1 more
    • English
    Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. This book examines past communication failures that have directly contributed to the loss of lives, giving readers in-depth discussions of the public networks that impact emergency management, covering social media, crowdsourcing techniques, wearable wireless sensors, moving-cells scenarios, mobility management protocols, 5G networks, broadband networks, data dissemination, and the resources of the frequency spectrum.
  • Intel Xeon Phi Processor High Performance Programming

    Knights Landing Edition
    • 2nd Edition
    • James Jeffers + 2 more
    • English
    Intel Xeon Phi Processor High Performance Programming is an all-in-one source of information for programming the Second-Generation Intel Xeon Phi product family also called Knights Landing. The authors provide detailed and timely Knights Landingspecific details, programming advice, and real-world examples. The authors distill their years of Xeon Phi programming experience coupled with insights from many expert customers — Intel Field Engineers, Application Engineers, and Technical Consulting Engineers — to create this authoritative book on theessentials of programming for Intel Xeon Phi products. Intel® Xeon Phi™ Processor High-Performance Programming is useful even before you ever program a system with an Intel Xeon Phi processor. To help ensure that your applications run at maximum efficiency, the authors emphasize key techniques for programming any modern parallel computing system whether based on Intel Xeon processors, Intel Xeon Phi processors, or other high-performance microprocessors. Applying these techniques will generally increase your program performance on any system and prepareyou better for Intel Xeon Phi processors.
  • Smart Cities and Homes

    Key Enabling Technologies
    • 1st Edition
    • Petros Nicopolitidis
    • English
    Smart Cities and Homes: Key Enabling Technologies explores the fundamental principles and concepts of the key enabling technologies for smart cities and homes, disseminating the latest research and development efforts in the field through the use of numerous case studies and examples. Smart cities use digital technologies embedded across all their functions to enhance the wellbeing of citizens. Cities that utilize these technologies report enhancements in power efficiency, water use, traffic congestion, environmental protection, pollution reduction, senior citizens care, public safety and security, literacy rates, and more. This book brings together the most important breakthroughs and advances in a coherent fashion, highlighting the interconnections between the works in different areas of computing, exploring both new and emerging computer networking systems and other computing technologies, such as wireless sensor networks, vehicle ad hoc networks, smart girds, cloud computing, and data analytics and their roles in creating environmentally friendly, secure, and prosperous cities and homes. Intended for researchers and practitioners, the book discusses the pervasive and cooperative computing technologies that will perform a central role for handling the challenges of urbanization and demographic change.
  • Hiding Behind the Keyboard

    Uncovering Covert Communication Methods with Forensic Analysis
    • 1st Edition
    • Brett Shavers + 1 more
    • English
    Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
  • Network Performance and Security

    Testing and Analyzing Using Open Source and Low-Cost Tools
    • 1st Edition
    • Chris Chapman
    • English
    Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
  • Advances in Computers

    • 1st Edition
    • Volume 101
    • English
    Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.
  • Energy Efficiency in Data Centers and Clouds

    • 1st Edition
    • Volume 100
    • English
    Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.
  • Meeting People via WiFi and Bluetooth

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
  • Introduction to Neural Networks

    2nd Edition
    • 1st Edition
    • Architecture Technology Architecture Technology Corpor
    • English
    Please note this is a Short Discount publication.Neural network technology has been a curiosity since the early days of computing. Research in the area went into a near dormant state for a number of years, but recently there has been a new increased interest in the subject. This has been due to a number of factors: interest in the military, apparent ease of implementation, and the ability of the technology to develop computers which are able to learn from experience.This report summarizes the topic, providing the reader with an overview of the field and its potential direction. Included is an introduction to the technology and its future directions, as well as a set of examples of possible applications and potential implementation technologies.
  • Practical Deployment of Cisco Identity Services Engine (ISE)

    Real-World Examples of AAA Deployments
    • 1st Edition
    • Andy Richter + 1 more
    • English
    With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.