Bültmann & Gerriets
Security and Policy Driven Computing
von Lei Liu
Verlag: CRC Press
Gebundene Ausgabe
ISBN: 978-1-4398-2579-2
Erschienen am 13.12.2010
Sprache: Englisch
Format: 240 mm [H] x 161 mm [B] x 20 mm [T]
Gewicht: 607 Gramm
Umfang: 292 Seiten

Preis: 224,70 €
keine Versandkosten (Inland)


Dieser Titel wird erst bei Bestellung gedruckt. Eintreffen bei uns daher ca. am 16. November.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Biografische Anmerkung
Inhaltsverzeichnis
Klappentext

Lei has hands-on experience with analysis and problem proofs. He has four patents granted and two patents filed in the U.S. patent office. Lei has been writing a book on Next Generation Enterprise System.



A Parallel Search Optimization Using an Adaptive State-Action Index Structure. A Method of Policy Discovery for Storage and Data Management. Knowledge-Based Policy Discovery for Storage and Data Management. Stabilizing Read-Write Throughput of Transactional Memory for Contention Management. Parallel Search Optimization for Storage Virtualization. Finite Automata for Evaluating Testbed Resource Contention. Adaptive Buffer Tuning for Data Intensive Algebraic Operations. A Quantum Method of Representing Recurring Data Deduplication Policy States. QAM-Quantum Availability Mechanics without Recovery for Storage and Data Management. A Quantum Method with Unknown Future Tasks to Resolve Storage Message Conflicts. A Quantum Automatic Controlled Method for Storage Test Coverage. Protection Mechanics with a Quantum Operator for Anomaly Attacks. Index.



Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.
The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention.
An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.


andere Formate