Amazon Price: $97.95 $44.80 You save: $53.15 (54%). (as of July 23, 2017 21:24 –
Appropriate for researchers, practitioners, and students alike, Communication and Networking in Smart Grids presents state-of-the-art approaches and novel technologies for communication networks in smart grids. It explains how contemporary grid networks are developed and deployed and presents a collection of cutting-edge advances to help improve current practice.
Prominent researchers working on smart grids and in related fields around the world explain the fundamental aspects and applications of smart grids. Describing the role that communication and networking will play in future smart grids, they examine power delivery and the complete range of features and services available through smart grids. The book is divided into two parts: Smart Grids in General and Communications and Networks in Smart Grids. Its comprehensive coverage includes: Management of locally generated powers in micro grids Multi-perspective service management in virtual power plants Distributed algorithms for demand management and grid stability in smart grids Electric distribution grid optimizations for plug-in electric vehicles Communication technologies, networks, and strategies for practical smart grid deployments—from substations to meters Ontology-based resource description and discovery framework for low Carbon grid networks QoS in networking for smart grids
Continue reading “Communication and Networking in Smart Grids”
Amazon Price: $150.00 $103.85 You save: $46.15 (31%). (as of July 24, 2017 04:09 –
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.
Get the Fundamentals of Internet Architecture and the Protocol Layers
Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks—through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion.
Learn about Malware and Security Systems
Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication.
Understand Cyber Attacks—and What You Can Do to Defend against Them
This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them.
The book’s modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption.
Amazon Price: N/A (as of July 24, 2017 04:14 –
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.
Amazon Price: N/A (as of May 12, 2016 00:12 –
In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to reduce private businesses’ risk and vulnerability to criminal activities.
This book is practical and informational, demonstrating real applications of the concepts, theories, and methods of gathering and acting upon information that may suggest a threat to a company. It explains the difference between risk assessments, vulnerability assessments, and threat assessments, defines external and internal threats, and outlines how strategies to address either form of threat differ. It also establishes an outline of four key parts to an effective intelligence program: assessment, evaluation, analysis, and mitigation.
Continue reading “Intelligence-Based Security in Private Industry”
Amazon Price: N/A (as of July 24, 2017 10:50 –
Written by high performance computing (HPC) experts, Introduction to High Performance Computing for Scientists and Engineers provides a solid introduction to current mainstream computer architecture, dominant parallel programming models, and useful optimization strategies for scientific HPC. From working in a scientific computing center, the authors gained a unique perspective on the requirements and attitudes of users as well as manufacturers of parallel computers.
The text first introduces the architecture of modern cache-based microprocessors and discusses their inherent performance limitations, before describing general optimization strategies for serial code on cache-based architectures. It next covers shared- and distributed-memory parallel computer architectures and the most relevant network topologies. After discussing parallel computing on a theoretical level, the authors show how to avoid or ameliorate typical performance problems connected with OpenMP. They then present cache-coherent nonuniform memory access (ccNUMA) optimization techniques, examine distributed-memory parallel programming with message passing interface (MPI), and explain how to write efficient MPI code. The final chapter focuses on hybrid programming with MPI and OpenMP.
Continue reading “Introduction to High Performance Computing for Scientists and Engineers (Chapman & Hall/CRC Computational Science)”