menu
{ "item_title" : "Security and Policy Driven Computing", "item_author" : [" Lei Liu "], "item_description" : "Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention.An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/43/982/579/1439825793_b.jpg", "price_data" : { "retail_price" : "225.00", "online_price" : "225.00", "our_price" : "225.00", "club_price" : "225.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Security and Policy Driven Computing|Lei Liu

Security and Policy Driven Computing

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.

The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention.

An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

This item is Non-Returnable

Details

  • ISBN-13: 9781439825792
  • ISBN-10: 1439825793
  • Publisher: CRC Press
  • Publish Date: December 2010
  • Dimensions: 9.2 x 6.1 x 0.8 inches
  • Shipping Weight: 1.2 pounds
  • Page Count: 290

Related Categories

You May Also Like...

    1

BAM Customer Reviews