Kirjojen hintavertailu. Mukana 12 152 606 kirjaa ja 12 kauppaa.

Kirjailija

Sumit Ghosh

Kirjat ja teokset yhdessä paikassa: 5 kirjaa, julkaisuja vuosilta 2002-2013, suosituimpien joukossa Principles of Secure Network Systems Design. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

5 kirjaa

Kirjojen julkaisuhaarukka 2002-2013.

Algorithm Design for Networked Information Technology Systems

Algorithm Design for Networked Information Technology Systems

Sumit Ghosh; C.V. Ramamoorthy

Springer-Verlag New York Inc.
2013
nidottu
I felt deeply honored when Professor Sumit Ghosh asked me to write the foreword to his book with an extraordinary perspective. I have long admired him, ?rst as a student leader at Stanford, where he initiated the ?rst IEEE Computer Society’s student chapter, and later as an esteemed and inspiring friend whose transdisciplinary research broadened and enhanced the horizons of practitioners of computer science and engineering, including my own. His ideas, which are derived from his profound vision, deep critical thinking, and personal intuition, reach from information technology to bioscience, as - hibited in this excellent book. To me, an ordinary engineer, it opens up a panoramic view of the Universe of Knowledge that keeps expanding and - spiring,likethegoodIndianproverb,whichsays,“agoodbookinformsyou,an excellent book teaches you, and a great book changes you. ” I sincerely believe that Professor Ghosh’s book will help us change and advance the methods of systems engineering and technology. Vision Inspired vision sees ahead of others what will or may come to be, a vivid, imagined concept or anticipation. An inspired vision personi?es what is good and what like-minded individuals hope for. Our vision is one of creating an Internet of minds, where minds are Web sites or knowledge centers, which create, store, and radiate knowledge through interaction with other minds connected by a universal shared network. This vision will not just hasten the death of distance, but will also - carcerate ignorance.
Principles of Secure Network Systems Design

Principles of Secure Network Systems Design

Sumit Ghosh; H. Lawson

Springer-Verlag New York Inc.
2012
nidottu
As e-commerce becomes the norm of business transactions and information be­ comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.
Intelligent Transportation Systems

Intelligent Transportation Systems

Sumit Ghosh; Tony S. Lee

CRC Press Inc
2010
sidottu
For many transportation systems, the cost of expanding the infrastructure is too high. Therefore, the focus must shift to improving the quality of transportation within the existing infrastructure. The second edition of a bestseller, Intelligent Transport Systems: Smart and Green Infrastructure Design critically examines the successes and failures of intelligent transportation systems (ITS) during the course of the past decade. The new subtitle reflects this edition’s focus on meta-principles critical to moving ahead and successfully building ITS infrastructures that take advantage of smart/green technologies. The book identifies challenging problems that must be addressed in order to bring real quality of life improvements and positively impact our environmental and civil infrastructure systems. New in the second edition: Coverage of new, efficient green strategiesCritical review of important developments and implementation of ITS Discussion of how to apply new insights and meta-principles to real-world ITS problemsThe authors argue strongly for the need to incorporate innovative and creative approaches to transportation problems, based on the fundamental principles and thorough scientific validation. They stress the need for computer modeling and simulation of a representative system to help design and validate such complex, large-scale systems, and the design of new performance metrics to estimate the performance of these systems. They provide a radically different approach to transportation systems design—one that closely resembles reality and promises to yield an architecture that delivers the highest efficiency.
Algorithm Design for Networked Information Technology Systems

Algorithm Design for Networked Information Technology Systems

Sumit Ghosh; C.V. Ramamoorthy

Springer-Verlag New York Inc.
2003
sidottu
I felt deeply honored when Professor Sumit Ghosh asked me to write the foreword to his book with an extraordinary perspective. I have long admired him, ?rst as a student leader at Stanford, where he initiated the ?rst IEEE Computer Society’s student chapter, and later as an esteemed and inspiring friend whose transdisciplinary research broadened and enhanced the horizons of practitioners of computer science and engineering, including my own. His ideas, which are derived from his profound vision, deep critical thinking, and personal intuition, reach from information technology to bioscience, as - hibited in this excellent book. To me, an ordinary engineer, it opens up a panoramic view of the Universe of Knowledge that keeps expanding and - spiring,likethegoodIndianproverb,whichsays,“agoodbookinformsyou,an excellent book teaches you, and a great book changes you. ” I sincerely believe that Professor Ghosh’s book will help us change and advance the methods of systems engineering and technology. Vision Inspired vision sees ahead of others what will or may come to be, a vivid, imagined concept or anticipation. An inspired vision personi?es what is good and what like-minded individuals hope for. Our vision is one of creating an Internet of minds, where minds are Web sites or knowledge centers, which create, store, and radiate knowledge through interaction with other minds connected by a universal shared network. This vision will not just hasten the death of distance, but will also - carcerate ignorance.
Principles of Secure Network Systems Design

Principles of Secure Network Systems Design

Sumit Ghosh; H. Lawson

Springer-Verlag New York Inc.
2002
sidottu
As e-commerce becomes the norm of business transactions and information be­ comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.