
Computer Systems
Theory, Technology and Applications
Andrew Herbert, Karen Spärck Jones - Collection Monographs in Computer Science
Résumé
Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a leader of computer systems research and a noted innovator in the crucial area of system security.
Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book, while honoring Needham's important contributions, assembles a collection of articles showing the state of the art in systems-from formal calculi to mobile devices, from operating systems to application tools, and from security techniques to design policies.
Among the topics addressed:
- Access control, data integration, and their languages
- Clumps, clusters, and classification
- The economics of open systems
- The Needharn-Schroeder authentication protocol
- Sentient computing
- A technology transfer retrospective
- Real time in a real operating system
- Application-private networks
- Technologies for portable computing
- An authorization model for web services
- Challenges for computing research
- Protocol analysis, composability, and computation
This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field.
Sommaire
- On Access Control, Data Integration, and Their Languages
- Protocol Analysis, Composability and Computation
- Access Control in Distributed Systems
- Implementing Condition Variables with Semaphores
- Clumps, Clusters and Classification
- How to Implement Unnecessary Mutexes
- Bioware Languages
- The Economics of Open Systems
- From Universe to Global Internet
- Needham-Schroeder Goes to Court
- The Design of Reliable Operating Systems
- An Historical Connection between Time-Sharing and Virtual Circuits
- On Cross-Platform Security
- Distributed Computing Economics
- The Titan Influence
- Middleware? Muddleware?
- Grand Challenges for Computing Research
- Sentient Computing
- Cyber Security in Open Systems
- Software Components: Only the Giants Survive
- Security Protocols: Who Knows What Exactly?
- Volume Rendering by Ray-Casting in Shear-Image Order
- A Conceptual Authorization Model for Web Services
- The Trouble with Standards
- Novelty in the Nemesis Operating System
- A Technology Transfer Retrospective
- An Optical LAN
- What’s in a Name?
- The Cryptographic Role of the Cleaning Lady
- Real Time in a Real Operating System
- Zen and the Art of Research Management
- The Descent of BAN
- Brief Encounters
- Retrieval System Models: What’s New?
- Slammer: An Urgent Wake-Up Call
- Caching Trust Rather Than Content
- Least Privilege and More
- Using Sharing to Simplify System Management
- An RSA-Related Number-Theoretic Surprise
- Application-Private Networks
- Using the CORAL System to Discover Attacks on Security Protocols
- On the Role of Binding and Rate Adaptation in Packet Networks
- Technologies for Portable Computing
- Multiple Alternative Voting
- The Semiotics of Umbrellas
- Computers for Specialized Application Areas
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Springer |
Auteur(s) | Andrew Herbert, Karen Spärck Jones |
Collection | Monographs in Computer Science |
Parution | 21/04/2004 |
Nb. de pages | 338 |
Format | 16 x 24 |
Couverture | Relié |
Poids | 625g |
Intérieur | Noir et Blanc |
EAN13 | 9780387201702 |
ISBN13 | 978-0-387-20170-2 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Développement d'applications Modélisation et génie logiciel
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Conception et architectures réseau
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet