Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (13)
- Engineering (13)
- Hardware Systems (13)
- Computer and Systems Architecture (12)
- Digital Circuits (12)
-
- Digital Communications and Networking (12)
- Electrical and Computer Engineering (12)
- Engineering Education (12)
- Systems Architecture (12)
- Systems and Communications (12)
- VLSI and Circuits, Embedded and Hardware Systems (12)
- Databases and Information Systems (9)
- Business (8)
- Management Information Systems (8)
- Software Engineering (1)
- Keyword
-
- Books (11)
- Computer science (9)
- Computer security (9)
- Computers (9)
- Data security (9)
-
- Information security (9)
- Patents (7)
- Network administration (4)
- Invited Talks (3)
- Architecture (2)
- Financial trading (2)
- Networking (2)
- Neural networks (2)
- Trading systems (2)
- BRAMS (1)
- Byzantine fault tolerance (1)
- Conference Proceedings (1)
- Dataflow (1)
- Decision making (1)
- Dependable Systems (1)
- Distributed consensus (1)
- Encryption (1)
- Grid and HPC computing (1)
- Group communications (1)
- HPC Architectures (1)
- Job scheduler (1)
- Lachesis (1)
- Logging and checkpointing (1)
- Multithreaded (1)
- Multithreading (1)
- Publication Year
Articles 1 - 27 of 27
Full-Text Articles in OS and Networks
Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord
Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.
Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.
Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …
Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden
Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden
Herbert J. Mattord
Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …
Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …
Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …
Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.
Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green
Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green
Herbert J. Mattord
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book …
Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …
Building Dependable Distributed Systems, Wenbing Zhao
Building Dependable Distributed Systems, Wenbing Zhao
Wenbing Zhao
This book covers the most essential techniques for designing and building dependable distributed systems. Instead of covering a broad range of research works for each dependability strategy, the book focuses only a selected few (usually the most seminal works, the most practical approaches, or the first publication of each approach) are included and explained in depth, usually with a comprehensive set of examples. The goal is to dissect each technique thoroughly so that readers who are not familiar with dependable distributed computing can actually grasp the technique after studying the book.
The book contains eight chapters. The first chapter introduces …
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Bruce Vanstone
No abstract provided.
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Tobias Hahn
No abstract provided.
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
Robert A Iannucci
No abstract provided.
Identifying Linux Bug Fixing Patches, Tian Yuan, Julia Lawall, David Lo
Identifying Linux Bug Fixing Patches, Tian Yuan, Julia Lawall, David Lo
David LO
In the evolution of an operating system there is a continuing tension between the need to develop and test new features, and the need to provide a stable and secure execution environment to users. A compromise, adopted by the developers of the Linux kernel, is to release new versions, including bug fixes and new features, frequently, while maintaining some older “longterm” versions. This strategy raises the problem of how to identify bug fixing patches that are submitted to the current version but should be applied to the longterm versions as well. The current approach is to rely on the individual …
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Allen B. Downey
This paper presents the design and implementation of Lachesis, a job scheduler for the Cray T3E. Lachesis was developed at the San Diego Supercomputer Center (SDSC) in an attempt to correct some problems with the scheduling system Cray provides with the T3E.
Evaluation Of Hpc Architectures For Brams Numerical Weather Model, Eugenio Almeida, Michael Bauer, Alvaro Fazenda
Evaluation Of Hpc Architectures For Brams Numerical Weather Model, Eugenio Almeida, Michael Bauer, Alvaro Fazenda
Eugenio Almeida
No abstract provided.
Embedded Systems As Datacenters, Robert Iannucci
Embedded Systems As Datacenters, Robert Iannucci
Robert A Iannucci
No abstract provided.
Platform Thinking In Embedded Systems, Robert Iannucci
Platform Thinking In Embedded Systems, Robert Iannucci
Robert A Iannucci
No abstract provided.
Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart
Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart
Robert A Iannucci
No abstract provided.
Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub
Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub
Robert A Iannucci
No abstract provided.
System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor
System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor
Robert A Iannucci
No abstract provided.
Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith
Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith
Robert A Iannucci
No abstract provided.
High Performance Memory System Pct:Ep0199134, Robert Iannucci
High Performance Memory System Pct:Ep0199134, Robert Iannucci
Robert A Iannucci
No abstract provided.
Parallel Machines: Parallel Machine Languages, Robert Iannucci
Parallel Machines: Parallel Machine Languages, Robert Iannucci
Robert A Iannucci
No abstract provided.
Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber
Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber
Robert A Iannucci
No abstract provided.
High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci
High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci
Robert A Iannucci
No abstract provided.
Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber
Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber
Robert A Iannucci
No abstract provided.