Security and Policy Driven Computing (Hardcover, New)


Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

R4,603

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles46030
Mobicred@R431pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 12 - 17 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Crc Press

Country of origin

United States

Release date

December 2010

Availability

Expected to ship within 12 - 17 working days

First published

2011

Authors

Dimensions

234 x 156 x 23mm (L x W x T)

Format

Hardcover

Pages

290

Edition

New

ISBN-13

978-1-4398-2579-2

Barcode

9781439825792

Categories

LSN

1-4398-2579-3



Trending On Loot