ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (39)
  • Computer Science  (39)
  • Computer science  (38)
  • 2010-2014  (39)
  • Computer Science  (39)
  • Nature of Science, Research, Systems of Higher Education, Museum Science
  • 1
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Computer organization ; Computer Science ; Computer Science, general ; Computer Systems Organization and Communication Networks
    Description / Table of Contents: Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources. Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - "chirps". Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored
    Pages: Online-Ressource (XXVI, 192 pages) , 75 illustrations
    ISBN: 9781430257417
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...