Networked Applications


Book Description

This book offers non-experts an accessible, thoughtful introduction to the applications and infrastructure in networked computing, providing them with the information to make the right technological and organizational decisions as they work with developers to design or acquire effective computing solutions. The book uses plain English to explain important networked computing terminology and concepts, such as security, middleware, and electronic payments.




The Essential Guide to Computing


Book Description

Perfect for anyone who needs a basic understanding of how computers work, this introductory guide gives friendly, accessible, up-to-date explanations of computer hardware, software, networks, and the Internet. Coverage also includes micro-processors, operating systems, programming languages, applications, and e-commerce.




Guide to Computer Network Security


Book Description

This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life. In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations. Topics and features: Explores the range of risks and vulnerabilities in all connected digital systems Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Describes the fundamentals of traditional computer network security, and common threats to security Discusses the role and challenges of artificial intelligence in advancing the security of computing systems’ algorithms, protocols, and best practices Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries. Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.




Guide to Reliable Distributed Systems


Book Description

This book describes the key concepts, principles and implementation options for creating high-assurance cloud computing solutions. The guide starts with a broad technical overview and basic introduction to cloud computing, looking at the overall architecture of the cloud, client systems, the modern Internet and cloud computing data centers. It then delves into the core challenges of showing how reliability and fault-tolerance can be abstracted, how the resulting questions can be solved, and how the solutions can be leveraged to create a wide range of practical cloud applications. The author’s style is practical, and the guide should be readily understandable without any special background. Concrete examples are often drawn from real-world settings to illustrate key insights. Appendices show how the most important reliability models can be formalized, describe the API of the Isis2 platform, and offer more than 80 problems at varying levels of difficulty.




Internet System Handbook


Book Description

This book describes and explains the Internet to communications professionals, and provides the knowledge and insight they need in order to understand and use the Internet. Among topics addressed are the historical evolution of the Internet community, the technologies employed in the Internet's development, management of the technology for a cohesive infrastructure, and future trends.




Guide to Cloud Computing


Book Description

This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment. The book not only considers the technologies for designing and creating cloud computing platforms, but also the business models and frameworks in real-world implementation of cloud platforms. Emphasis is placed on “learning by doing,” and readers are encouraged to experiment with a range of different tools and approaches. Topics and features: includes review questions, hands-on exercises, study activities and discussion topics throughout the text; demonstrates the approaches used to build cloud computing infrastructures; reviews the social, economic, and political aspects of the on-going growth in cloud computing use; discusses legal and security concerns in cloud computing; examines techniques for the appraisal of financial investment into cloud computing; identifies areas for further research within this rapidly-moving field.




Services Computing


Book Description

This book bridges the gap between Business and IT services and proposes an original life-cycle view of the modern service industry. Major solution architectures, technologies and research methods are discussed in the lifecycle of services innovation research. The book provides readers with new research and solution methods to enable IT services and computing technology to better create and manage business services, which is the goal of Services Computing.




Cloud Security


Book Description

Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches