In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs).
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
The Practical Handbook of Internet Computing analyzes a broad array of technologies and concerns related to the Internet, including corporate intranets.
This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single "e;super-SDP RFC"e; with almost one-to-one integrity from beginning to end to see the big picture of SDP in addition to base SDP functionalities.
For anyone involved in buying and managing telephone systems, this book brings clarity to the confusing array of products and services (like voicemail, interactive voice response, fax-on-demand, T-1, DSL, etc.
Recent developments in computer communications and networks have enabled the deployment of exciting new areas such as Internet of Things and collaborative big data analysis.
Explore various Rust features, data structures, libraries, and toolchain to build modern systems software with the help of hands-on examplesKey FeaturesLearn techniques to design and build system tools and utilities in RustExplore the different features of the Rust standard library for interacting with operating systemsGain an in-depth understanding of the Rust programming language by writing low-level softwareBook DescriptionModern programming languages such as Python, JavaScript, and Java have become increasingly accepted for application-level programming, but for systems programming, C and C++ are predominantly used due to the need for low-level control of system resources.
Provides a professional-level reference to the Samsung ARTIK API, as well as to other aspects of interest to developers such as the file systems, the operating system internals, various available interfaces, input/output, and the hardware itself.
This book examines some of the underlying processes behind different forms of information management, including how we store information in our brains, the impact of new technologies such as computers and robots on our efficiency in storing information, and how information is stored in families and in society.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks.
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level.
Due to the widespread use of navigation systems for wayfinding and navigation in the outdoors, researchers have devoted their efforts in recent years to designing navigation systems that can be used indoors.
High Speed Packet Access (HSPA) is a collection of two mobile telephony protocols, High Speed Downlink Packet Access (HSDPA) and High Speed Uplink Packet Access (HSUPA).
This book offers a rigorous analysis of the achievements in the field of traffic control in large networks, oriented on two main aspects: the self-similarity in traffic behaviour and the scale-free characteristic of a complex network.
Computer Architecture: A Quantitative Approach, Sixth Edition has been considered essential reading by instructors, students and practitioners of computer design for over 20 years.
Focusing on heterogeneous networks, this book addresses important resource management and security issues found in networks and uses theoretical tools to model them.
This book aims to give an overview of recent developments in indoor near-infrared optical wireless communication technologies and systems, including basic theories, operating fundamentals, system architectures, modelling, experimental demonstrations, advanced techniques, and most recently, the research efforts towards integrations.
Learn from the AWS subject-matter experts, apply real-world scenarios and clear the AWS Certified Solutions Architect -Associate examKey FeaturesBuild highly reliable and scalable workloads on the AWS platformPass the exam in less time and with confidenceGet up and running with building and managing applications on the AWS platformBook DescriptionAmazon Web Services (AWS) is currently the leader in the public cloud market.
This book contains a collection of scientific chapters addressing the emerging trends in IT and telecommunications, as well as the issues that accompany them in business.
Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system.
Cooperating Heterogeneous Systems provides an in-depth introduction to the issues and techniques surrounding the integration and control of diverse and independent software components.
This textbook serves as an introduction to the subject of embedded systems design, with emphasis on integration of custom hardware components with software.