Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Volume 3 电子书下载
书名:Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Volume 3
Volume III: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications.Part 1: Distributed Networks. Client/Server Computing Basics (Daniel McFarland and Darren B. Nicholson). Groupware (Robert Slagter). Network Middleware (Linda Volonino and Pragati Dalal). Grid Computing Fundamentals (Mark Baker). Grid Computing Implementation (Barry Wilkinson and Clayton Ferner). Cluster Computing Fundamentals (Hong Ong and Mark Baker). Next-Generation Cluster Networks (Keren Bergman, Benjamin A. Small, and Larry A. Bergman). Utility Computing on Global Grids (Chee Shin Yeo, Rajkumar Buyya, Marcos Dias de Assuncao, Jia Yu, Anthony Sulistio, Srikumar Venugopal and Martin Placek). Peer-to-Peer Network Architecture (Jing Wu and Michel Savoie). Peer-to-Peer Network Applications (Stan Kurkovsky). Incentive Issues in Peer-to-Peer Systems (Yu-Kwong Kwok). Storage Area Network Fundamentals (Vladimir V. Riabov). Fiber Channel (Jiying Zhao). Storage Area Networks: Architectures and Protocols (Nirwan Ansari and Si Yin). Distributed Intelligent Networks (G. N. Prezerakos and I. S. Venieris). Smart Cards: Communication Protocols and Applications (Michael Tunstall, Konstantinos Markantonakis, Damien Sauveron, and Keith Mayes). Fault-Tolerant Systems (Amiya Nayak). Distributed Algorithms (Valmir C. Barbosa). Distributed Databases (David Coquil and Harald Kosch).Part 2: Network Planning, Control, and Management. Network Capacity Planning (Priscilla Oppenheimer). Network Traffic Modeling (Thomas M. Chen). Network Traffi c Management (Thomas M. Chen). Network Security Risk Assessment and Management (Dan Port, Rick Kazman, and David Klappholz). Network Reliability and Fault Tolerance (Matthew Liotine). Social Engineering (Benjamin Bock, Markus D. Klemen, and Edgar R. Weippl). Intrusion-Detection Systems (Peng Ning and Sushil Jajodia). Network Attacks (Mohamed Hamdi and Noureddine Boudriga). Computer Viruses and Worms (Robert Slade). Denial of Service Attacks (Qijun Gu and Peng Liu). E-Mail Threats and Vulnerabilities (David Harley). Virtual Private Networks (G. I. Papadimitriou, M. S. Obaidat, C. Papazoglou, and A.S.Pomportsis). Cryptography (Ari Juels) Access Control (Sabrina De Capitani di Vimercati, Sara Foresti,Stefano Paraboschi, and Pierangela Samarati) Biometrics (James L. Wayman). Firewalls (James E. Goldman). Authentication (Patrick McDaniel). Password Authentication (Jeremy L. Rasmussen). Physical Security Threats and Measures (Mark Michael). Computer Security Incident Response Teams (CSIRTs) (Raymond R. Panko). Backup and Recovery System Requirements (David R. Reavis). Business Requirements of Backup Systems (Markus Klemen, Thomas Neubauer, and Edgar R. Weippl). Evaluating Storage Media Requirements (David R. Reavis). Business Continuity Planning (Marco Cremonini and Pierangela Samarati). E-Mail and Internet Use Policies (Nancy J. King). Computer Network Management (Jian Ren).Part 3: Computer Network Popular Applications and Future Directions. E-mail and Instant Messaging (Bhagyavati). Application Service Providers (ASPs) (Bandula Jayatilaka). Videoconferencing (Ketan Mayer-Patel). Computer Conferencing: Protocols and Applications (William R. Gillis and Colleen Taugher). Telecommuting and Telework (Michael Workman). Online Banking (Ronnie J. Phillips). Digital Libraries (Cavan McCarthy). Computer Conferencing and Distance Learning (Liam Rourke and Heather Kanuka). Electronic Commerce (Charles Steinfield). Electronic Data Interchange (EDI) (Matthew K. McGowan). Electronic Payment Systems (Indrajit Ray). Internet Relay Chat (IRC) (James M. Hudson and Paul L. Witt). Online Communities (Lee Sproull and Manuel Arriaga). Mobile Commerce (Vijay Atluri). Online News (Bruce Garrison and Marcus Messner). Travel and Tourism (Ulrike Gretzel, Youcheng Wang, and Daniel R. Fesenmaier). Web-Based Training (Patrick J. Fahy). RFID (Radio-Frequency Identification) (Stephen A. Weis). Active Networking (Stephen F. Bush). Applications of Biological Concepts to Designs of Computer Networks and Network Applications (Tatsuya Suda, Tadashi Nakano, and Keita Fujii). Nanotechnology for Communication Systems (Syed H. Murshid and Azhar M. Khayrattee). Molecular Communication: New Paradigm for Communication among Nanoscale Biological Machines (Michael Moore, Akihiro Enomoto, Tatsuya Suda, Tadashi Nakano, and Yutaka Okaie).Content:
尊敬的读者:
欢迎您访问我们的网站。本站的初衷是为大家提供一个共享学习资料、交换知识的平台。每位用户都可以将文件上传至网盘并分享。
然而,随着用户上传的资料增多,我们发现部分不宜或版权问题的书籍被分享到了本站。
为此,我们已经关闭了分享入口,并进行了多次书籍审查,但仍有部分内容未能彻底审查到位。
在此,我们恳请广大读者与我们共同监督,如发现任何不宜内容,请 点击此处 进行举报,我们会第一时间处理并下架相关内容。
希望我们能共建一个文明社区!感谢您的理解与支持!
猜你喜欢
- 《10倍速学习法》施坦纳经典版 电子书下载
- 《应物兄》李洱 电子书下载
- 《大脑认知系列共9册》丹尼尔·博尔(Daniel Bor) 电子书下载
- 《甲骨文·世界史:探秘西方文明早期样貌(全6册)巴比伦+哲人与权臣+地中海的画像+财富之城+1453+海洋帝国》 电子书下载
- 《哈利波特原版全集》[英] J·K·罗琳 电子书下载
- 《交换之物》柯浩德全新增订版 电子书下载
- 《米格尔在智利的地下行动》加西亚·马尔克斯中文版 电子书下载
- 《敢于放手的养育》张嘉栗典藏版 电子书下载
- 《摆渡人2重返荒原》克莱儿·麦克福尔 电子书下载
- 《史记菁华》(西汉)司马迁 / (清)姚苎田 电子书下载
- 《深度工作:如何有效使用每一点脑力》[美]卡尔·纽波特中文版 电子书下载
- 《洛克菲勒:一个关于财富的神话》荣·切尔诺 电子书下载