Skip to main content

Books in Computer systems organization

81-90 of 263 results in All results

Introduction to Cyber-Warfare

  • 1st Edition
  • May 16, 2013
  • Paulo Shakarian + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 7 8 1 4 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 9 2 6 - 7
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

The Wireshark Field Guide

  • 1st Edition
  • May 14, 2013
  • Robert Shimonski
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 1 3 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 4 9 6 - 9
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.

Mastering Cloud Computing

  • 1st Edition
  • April 5, 2013
  • Rajkumar Buyya + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 4 5 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 9 5 3 9 - 7
Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout.

Windows 2012 Server Network Security

  • 1st Edition
  • March 19, 2013
  • Derrick Rountree
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 5 8 - 3
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 6 5 - 1
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.

Programming Massively Parallel Processors

  • 2nd Edition
  • December 31, 2012
  • David B. Kirk + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 1 4 1 8 - 7
Programming Massively Parallel Processors: A Hands-on Approach, Second Edition, teaches students how to program massively parallel processors. It offers a detailed discussion of various techniques for constructing parallel programs. Case studies are used to demonstrate the development process, which begins with computational thinking and ends with effective and efficient parallel programs. This guide shows both student and professional alike the basic concepts of parallel programming and GPU architecture. Topics of performance, floating-point format, parallel patterns, and dynamic parallelism are covered in depth. This revised edition contains more parallel programming examples, commonly-used libraries such as Thrust, and explanations of the latest tools. It also provides new coverage of CUDA 5.0, improved performance, enhanced development tools, increased hardware support, and more; increased coverage of related technology, OpenCL and new material on algorithm patterns, GPU clusters, host programming, and data parallelism; and two new case studies (on MRI reconstruction and molecular visualization) that explore the latest applications of CUDA and GPUs for scientific research and high-performance computing. This book should be a valuable resource for advanced students, software engineers, programmers, and hardware engineers.

Federal Cloud Computing

  • 1st Edition
  • December 31, 2012
  • Matthew Metheny
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 7 3 9 - 8
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.

Connected Computing Environment

  • 1st Edition
  • Volume 90
  • December 2, 2012
  • Suyel Namasudra
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 8 1 1 1 - 6
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.

Fifth Generation Computer Systems

  • 1st Edition
  • November 13, 2012
  • T. Moto-Oka
  • English
  • eBook
    9 7 8 - 0 - 4 4 4 - 6 0 0 1 4 - 1
The Japan Information Processing Development Centre (JIPDEC) established a committee for Study and Research on Fifth-Generation Computers. Beginning in 1979, this Committee set out on a two-year investigation into the most desirable types of computer systems for application in the 1990`s (fifth-generation computers) and how the development projects aimed at the realization of these systems should be carried forward.This book contains the papers presented at the International Conference on Fifth Generation Computer Systems. Included among these papers is a preliminary report on the findings of the Committee.

Systems Engineering Using SDL-92

  • 1st Edition
  • November 13, 2012
  • A. Olsen
  • O. Færgemand + 3 more
  • English
  • eBook
    9 7 8 - 0 - 4 4 4 - 5 9 8 9 0 - 5
CCITT (now ITU-T) Specification and Description Language (SDL) and systems engineering (formal and informal) in SDL are considered in this publication. The latest version of the language, SDL-92 [ITU Z.100 SDL-92] is introduced. The book has been written for existing and potential users of SDL - technologists involved in the specification and engineering of systems. It offers easier learning, through examples and application, than the Z.100 Recommendation of March 1993, which gives precise technical definitions and concepts. The book has sufficient coverage of the language so that for normal use it should not be necessary to consult Z.100. For this reason, the grammars, both textual and graphical, are included, and the index makes it possible to find text on most of the language mechanisms.Chapter 1 provides an overview of specification and design of telecommunication systems. It considers the usage and scope of SDL. Chapter 2 gives an overview of the language, with an introduction of the major language elements. Chapter 3 focuses on the specification of behaviour and the information interchange between processes. Chapter 4 covers the structuring of systems in terms of instances, how these may be defined by types and how types may be organised in type/subtype hierarchies by inheritance. Parameterised types and packages of type definitions are also covered. Chapter 5 presents the part of the language that provides data types, with emphasis placed on how to use predefined data types. Chapter 6 presents the use of SDL for system engineering, with a discussion of general systems engineering principles followed by an introduction to methodologies which use SDL. The use of other languages in combination with SDL, documentation issues, naming and other lexical rules, errors and language support are considered, since they are more relevant to the use of language in engineering than when initially learning the language.

Advanced Persistent Threat

  • 1st Edition
  • November 13, 2012
  • Eric Cole
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 4 9 - 1
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 5 5 - 2
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.