Sisällysluettelo:
“…Physical and Logical Access Restriction -- Encryption -- 13.10 Alternative Protocols -- A Comparison of TCP/IP and OSI -- Other Protocol Suites and Components -- SCSI Over IP -- Cellular Technology -- MPLS -- Summary and Review -- For Further Reading -- Key Concepts and Terms -- Reading Review Questions -- Exercises -- Chapter 14 Communication Channel Technology -- 14.0 Introduction -- 14.1 Communication Channel Technology -- 14.2 The Fundamentals of Signaling Technology -- Analog Signaling -- Digital Signaling -- Modems -- Two Examples of Alternative Advanced Technologies -- 14.3 Transmission Media and Signaling Methods -- 14.4 Wireless Technologies -- Cellular Technology -- Wi-Fi -- Bluetooth -- Summary and Review -- For Further Reading -- Key Concepts and Terms -- Reading Review Questions -- Exercises -- Chapter 15 Modern Networked Computer Systems -- 15.0 Introduction -- 15.1 Distributed Systems -- 15.2 Client-Server Computing -- 15.3 Web-Based Computing -- 15.4 Peer-to-Peer Computing -- 15.5 Clusters -- Overview -- Classification and Configuration -- Beowulf Clusters -- 15.6 Storage Area Networks -- 15.7 Cloud Computing -- 15.8 Supercomputing -- Grid Computing -- 15.9 Networked Computer System Architecture Examples -- Google: A System Architecture Example -- Another Example: Facebook's Application Architecture -- Summary and Review -- For Further Reading -- Key Concepts and Terms -- Reading Review Questions -- Exercises -- Part V The Software Component -- Chapter 16 Operating Systems: An Overview -- 16.0 Introduction -- 16.1 The Barebones Computer System -- 16.2 The Operating Systems Concept: An Introduction -- 16.3 Services and Facilities -- User Interface and Command Execution Services -- File Management -- Input/Output Services -- Process Control Management -- Memory Management -- Scheduling and Dispatch -- Secondary Storage Management…”
Sisällysluettelo:
“…Biometric Data, Within and Beyond Data Protection -- Catherine Jasserand -- 16. Conclusions -- Bart van der Sloot & -- Sascha van Schendel -- Author biographies…”
Sisällysluettelo:
“…LITTLE TOWN OF WEBSTER(pp. 79-86) -- https://doi.org/10.2307/jj.890689.16 -- https://www.jstor.org/stable/jj.890689.16 -- LIGHT SHOWS FROM MOLTEN SLAG MIGHT HAVE DELIGHTED WEBSTER residents at night, but by day, in the nascent years of the twentieth century, Websterites had much to be delighted by. …”
Sisällysluettelo:
“…How to Generate Cryptographically Strong Sequences of Pseudorandom Bits -- 10. How to Construct Random Functions -- 11. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks -- 12. …”