Browse Results

Showing 6,726 through 6,750 of 62,757 results

Attachments: Is there such a thing as love before first sight? The romantic comedy we all need to read in 2021

by Rainbow Rowell

'Heartwarming, romantic and great fun' CLOSEREveryone in the newsroom knows that somebody is monitoring their emails, but Beth and Jennifer don't believe anyone would read their never-ending conversations. But Lincoln does, it's his job, and Beth and Jennifer's hilarious, no-holds-barred emails are the best part of his day.The only problem is he's starting to fall in love with Beth, and yet she doesn't even know he exists. With ex-boyfriends, office politics and family drama, there never seems to be a good time for Lincoln to introduce himself. But to get the life you want sometimes you need to put yourself out there...'Cracking, laugh-out-loud dialogue, characters that feel painfully real, and a sweet premise about love in the information age: if ATTACHMENTS were an e-mail, I'd be forwarding it to my entire list of contacts' Jodi Picoult, bestselling author of A Spark of Light

Attack Surface Management

by Ron Eddings Mj Kaufmann

Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats. The process covers all security aspects, from daily operations and threat hunting to vulnerability management and governance. You'll learn:Fundamental ASM concepts, including their role in cybersecurity>How to assess and map your organization's attack surface, including digital assets and vulnerabilitiesStrategies for identifying, classifying, and prioritizing critical assetsAttack surfaces types, including each one's unique security challengesHow to align technical vulnerabilities with business risksPrinciples of continuous monitoring and management to maintain a robust security postureTechniques for automating asset discovery, tracking, and categorizationRemediation strategies for addressing vulnerabilities, including patching, monitoring, isolation, and containmentHow to integrate ASM with incident response and continuously improve cybersecurity strategies ASM is more than a strategy—it's a defense mechanism against growing cyber threats. This guide will help you fortify your digital defense.

Attack and Defend Computer Security Set

by Blake Hartstein Steven Adair Ozh Richard Dafydd Stuttard Marcus Pinto Michael Hale Ligh

Defend your networks and data from attack with this unique two-book security setThe Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker's Handbook and Malware Analyst's Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves.The Web Application Hacker's Handbook takes a broad look at web application security and exposes the steps a hacker can take to attack an application, while providing information on how the application can defend itself. Fully updated for the latest security trends and threats, this guide covers remoting frameworks, HTML5, and cross-domain integration techniques along with clickjacking, framebusting, HTTP parameter pollution, XML external entity injection, hybrid file attacks, and more.The Malware Analyst's Cookbook includes a book and DVD and is designed to enhance the analytical capabilities of anyone who works with malware. Whether you're tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you go beyond the basic tools for tackling security challenges to cover how to extend your favorite tools or build your own from scratch using C, Python, and Perl source code. The companion DVD features all the files needed to work through the recipes in the book and to complete reverse-engineering challenges along the way.The Attack and Defend Computer Security Set gives your organization the security tools needed to sound the alarm and stand your ground against malicious threats lurking online.

Attack from Tilted Towers: An Unofficial Novel of Fortnite (Trapped In Battle Royale)

by Devin Hunter

With Tae Min’s help, Grey’s squad reaches the top ten, but every game changes who will stay trapped in Fortnite Battle Royale and who will go home. There are only three days of battles left, and Grey isn’t sure it’s enough to secure top five for his whole squad. His rank is higher than his friends, and it starts to look like he’ll get home like he wanted. But someone he cares about will have to stay, and Grey has to make a choice: give up his spot or leave his friends. Either choice will mean losing something, but Grey must decide if what’s gained is worth more.

Attack from Within: How Disinformation Is Sabotaging America

by Barbara McQuade

A NEW YORK TIMES BESTSELLERAn urgent, comprehensive explanation of the ways disinformation is impacting democracy, and practical solutions that can be pursued to strengthen the public, media, and truth-based politicsMSNBC's legal expert breaks down the ways disinformation has become a tool to drive voters to extremes, disempower our legal structures, and consolidate power in the hands of the few."One of the most acute observers of our time shares . . . a compelling work about a challenge that—left unexamined and left unchecked—could undermine our democracy." —Eric H. Holder Jr, 82nd Attorney General of the United StatesAmerican society is more polarized than ever before. We are strategically being pushed apart by disinformation—the deliberate spreading of lies disguised as truth—and it comes at us from all sides: opportunists on the far right, Russian misinformed social media influencers, among others. It's endangering our democracy and causing havoc in our electoral system, schools, hospitals, workplaces, and in our Capitol. Advances in technology including rapid developments in artificial intelligence threaten to make the problems even worse by amplifying false claims and manufacturing credibility.In Attack from Within, legal scholar and analyst Barbara McQuade, shows us how to identify the ways disinformation is seeping into all facets of our society and how we can fight against it. The book includes: The authoritarian playbook: a brief history of disinformation from Mussolini and Hitler to Bolsonaro and Trump, chronicles the ways in which authoritarians have used disinformation to seize and retain power.Disinformation tactics—like demonizing the other, seducing with nostalgia, silencing critics, muzzling the media, condemning the courts; stoking violence—and reasons why they work.An explanation of why America is particularly vulnerable to disinformation and how it exploits our First Amendment Freedoms, sparks threats and violence, and destabilizes social structures.Real, accessible solutions for countering disinformation and maintaining the rule of law such as making domestic terrorism a federal crime, increasing media literacy in schools, criminalizing doxxing, and much more.Disinformation is designed to evoke a strong emotional response to push us toward more extreme views, unable to find common ground with others. The false claims that led to the breathtaking attack on our Capitol in 2021 may have been only a dress rehearsal. Attack from Within shows us how to prevent it from happening again, thus preserving our country&’s hard-won democracy.

Attack of the Drowned: An Unofficial Minecrafters Novel (Aquatic Adventures in the Overworld #2)

by Maggie Marks

Introducing the second novel of the brand-new series about the aquatic world of Minecraft! Brothers Mason and Asher have only ever known the comfort of dry land in the Overworld. But when a terrifying shipwreck leaves them stranded, their new friend Luna urges them to safe haven—underwater. In each story of the all-new series for Minecrafters, Aquatic Adventures in the Overworld, this unlikely trio must make the choice of staying in the world they know best and risk death, or voyaging into an unknown world where anything could happen. Follow their journey as Mason, Asher, and Luna face incredible obstacles and discover strength they never knew they had in Aquatic Adventures in the Overworld. In the second novel of their aquatic adventures, Mason and Asher&’s underwater base seems safe and peaceful, except for the fish-beast guardians that swim past. But when glowing eyes appear—watching the brothers through their glass walls—they realize they&’re trapped. The Drowned are everywhere! Food is running low and a leaking roof threatens to cave in. Will Luna arrive in time to help, or will Mason need to leave his home and face the Drowned head-on?

Attack of the Ender Dragon: An Unofficial Minetrapped Adventure, #6 (The Unofficial Minetrapped Adventure #6)

by Winter Morgan

All Lily, Simon, and Michael have wanted since they were sucked into their Minecraft games is to return to the real world. They’ve battled armies of griefers and terrifying monsters, made new allies, and had their friendship tested time and again. But they’ve never forgotten their number one goal: getting back home. <p><p> In this thrilling final installment in the Unofficial Minetrapped Adventure series, a powerful lightning storm strikes the Overworld, instantly transporting Lily back to the real world! But it’s not the homecoming she had planned, especially without her friends by her side, and she’s desperate to get Michael and Simon back home and out of the game forever. <p> Meanwhile, Michael and Simon are in the biggest battle of their Minecraft lives, against Ender Dragons summoned by an unknown griefer. In a series conclusion you won’t want to miss, it’s the gang’s last chance to escape the Overworld-or risk being trapped for good.

Attack of the Goblin Army (Tales of a Terrarian Warrior #1)

by Winter Morgan

Welcome to Terraria, a world like Minecraft’s Overworld that’s full of action and possibility. Unique treasures to horde, wondrous biomes to explore, intricate buildings to construct, and treacherous villains to fight await anyone daring and creative enough to seek fortune and glory in Terraria. <p><p> Miles, a young hero setting out on his first quest, yearns to become Terraria’s strongest hero-and when Matthew offers to adventure alongside him as his friend and personal guide, he’s positive that the road to success is paved before them. Matthew tells Miles that to truly advance in the game, he must defeat the Wall of Flesh, so he sets his sights on that goal. <p> But Miles is devastated when he learns that becoming powerful enough to defeat the Wall of Flesh will come at a high cost: Matthew will be destroyed, and he’ll lose his best friend forever. Miles must make a decision: should he stay loyal to Matthew and set his own dreams aside, or sacrifice his closest friend for the chance to chart a life in an unknown territory and save his biome? <p> In this first exciting installment in the Tales of a Terrarian Warrior series, every choice has the power to change the future, and turning back is never an option.

Attack of the Killer Bunnies: An Unofficial Graphic Novel for Minecrafters (The Glitch Force #1)

by Megan Miller

The first book in an exciting brand-new series by New York Times bestselling author Megan Miller—The Glitch Force!The Glitch is an elite task force sent in to eliminate a terrifying creature invasion in the dark forest. Never having visited the dark forest before, its members find themselves in a dangerous woodland mansion with evokers and pillagers lurking everywhere. Then there are the unhinged forest villagers to contend with! A full-scale battle ensues, and the team must risk their lives and enlist a team of unreliable but deadly mobs to help them destroy a deceptively adorable threat: an army of killer bunnies with glowing red eyes and an appetite for disaster.

Attack on Minecrafters Academy: The Unofficial Minecrafters Academy, Book Four (The Unofficial Minecrafters Academy Series #4)

by Winter Morgan

It’s a new school year at Minecrafters Academy, and Lucy is returning-this time not as a student, but as headmaster. She sets to work preparing the school for the Overworld Academic Olympics, a prestigious competition that will test their combat, treasure hunting, and potions brewing skills.But training is interrupted when an explosion rocks the campus. The school is under attack from a mysterious culprit-and everyone is a suspect.Meanwhile, Julia, a new student at Minecrafters Academy, is having a hard time adjusting to her new life on campus. When she catches her roommate, Hallie, sneaking around just after the attacks on the school, Julia begins to suspect her. Then Hallie goes missing right before another round of explosions and a massive creeper invasion. It’s up to the students and teachers of Minecrafters Academy to track down the villain behind the attacks and protect not just the school, but the entire Overworld.As the Unofficial Minecrafters Academy series continues, new friends and sinister new foes will be revealed.

Attack-and-Defense Games for Control Systems: Analysis and Synthesis

by Yuanqing Xia Yuan Yuan Huanhuan Yuan Huapeng Dong Mengbi Wang

This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks.Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems.This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.

Attacking Judges: How Campaign Advertising Influences State Supreme Court Elections

by Melinda Gann Hall

Nasty, below-the-belt campaigns, mudslinging, and character attacks. These tactics have become part and parcel of today's election politics in America, and judicial elections are no exception. Attacking Judges takes a close look at the effects of televised advertising, including harsh attacks, on state supreme court elections. Author Melinda Gann Hall investigates whether these divisive elections have damaging consequences for representative democracy. To do this, Hall focuses on two key aspects of those elections: the vote shares of justices seeking reelection and the propensity of state electorates to vote. In doing so, Attacking Judges explores vital dimensions of the conventional wisdom that campaign politics has deleterious consequences for judges, voters, and state judiciaries. Countering the prevailing wisdom with empirically based conclusions, Hall uncovers surprising and important insights, including new revelations on how attack ads influence public engagement with judicial elections and their relative effectiveness in various types of state elections. Attacking Judges is a testament to the power of institutions in American politics and the value of empirical political science research in helping to inform some of the most significant debates on the public agenda. This book's results smartly contest and eradicate many of the fears judicial reformers have about the damaging effects of campaign negativity in modern state supreme court elections.

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

by James Forshaw

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world&’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker&’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.You&’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you&’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to:- Capture, manipulate, and replay packets- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol- Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service- Use capture and analysis tools like ­Wireshark and develop your own custom network proxies to manipulate ­network trafficAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.

Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13745)

by Steven Furnell Weizhi Meng Wenjuan Li

This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Attacks and Defenses for the Internet-of-Things: 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings (Lecture Notes in Computer Science #15397)

by Moti Yung Weizhi Meng Jun Shao

This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Attacks, Defenses and Testing for Deep Learning

by Jinyin Chen Ximin Zhang Haibin Zheng

This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, wherethe attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model. An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method. The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks. The network add-on method prevents the adversarial examples by training the adversarial example detector. Testing deep neural networks is an effective method to measure the security and robustness of deep learning models. Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved. Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning.

Attaining High Performance Communications: A Vertical Approach

by Ada Gavrilovska

No single solution applied at one particular layer can help applications solve all performance-related issues with communication services. Instead, this book shows that a coordinated effort is needed among the layers. It covers many different types of technologies and layers across the stack, from the architectural features of the hardware, through the protocols and their implementation in operating system kernels, to the manner in which application services and middleware are using underlying platforms. The book also describes key developments in high-end platforms, high performance interconnection fabrics and communication libraries, and multi- and many-core systems.

Attention Hijacked: Using Mindfulness to Reclaim Your Brain from Tech

by Erica B. Marcus

Technology surrounds us every day: a phone alarm wakes us up, an electronic calendar tracks assignment deadlines, GPS directs us to the new dentist’s office, social media keeps us connected to friends and family, and streaming platforms make sure we’re never without something new to binge-watch. Our devices and apps can make life much more convenient and entertaining. But for years, scientists have warned that too much screen time may have negative effects on our health. With portable devices and remote learning, it is even more difficult to put down electronics. Being intentional about how and when to unplug can help teens and young adults to protect their physical and mental wellbeing in a world where screens and technology are increasingly becoming necessities rather than just conveniences. Attention Hijacked offers a roadmap for those deciding how they want to deal with technology, exploring the ways technology affects the individual, dispelling common misinformation, and using this knowledge to make personalized decisions. Page Plus links in the book lead to mindfulness and meditation audio clips. Using mindfulness techniques, this book gives readers the power to take charge of their technology use.

Attract Visitors to Your Site: The Mini Missing Manual

by Matthew MacDonald

To be a success, a website has to attract-and keep--visitors. This Mini Missing Manual shows you how to attract new and return visitors and use the power of keywords and Web search engines to rise up in the rankings of search results. You'll also learn how to use a powerful-and free--service that tracks visitor activity on your site so you know which of your Web pages they love, and-just as important--which pages don't work for them. Using this information, you can fine-tune your site to keep the visitors coming.This Mini Missing Manual is excerpted from Creating a Web Site: The Missing Manual.

Attractor Dimension Estimates for Dynamical Systems: Dedicated to Gennady Leonov (Emergence, Complexity and Computation #38)

by Nikolay Kuznetsov Volker Reitmann

This book provides analytical and numerical methods for the estimation of dimension characteristics (Hausdorff, Fractal, Carathéodory dimensions) for attractors and invariant sets of dynamical systems and cocycles generated by smooth differential equations or maps in finite-dimensional Euclidean spaces or on manifolds. It also discusses stability investigations using estimates based on Lyapunov functions and adapted metrics. Moreover, it introduces various types of Lyapunov dimensions of dynamical systems with respect to an invariant set, based on local, global and uniform Lyapunov exponents, and derives analytical formulas for the Lyapunov dimension of the attractors of the Hénon and Lorenz systems. Lastly, the book presents estimates of the topological entropy for general dynamical systems in metric spaces and estimates of the topological dimension for orbit closures of almost periodic solutions to differential equations.

Attribute-Based Encryption and Access Control (Data-Enabled Engineering)

by Yan Zhu Dijiang Huang Qiuxiang Dong

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments

by Jianbin Gao Qi Xia Kwame Omono Asamoah Isaac Amankona Obiri Daniel Adu Worae

Attribute-based Encryption (ABE) Enables readers to understand applications of attribute-based encryption schemes in cloud computing with the support of blockchain technology With a focus on blockchain technology, Attribute-based Encryption (ABE) provides insight into the application of attribute-based encryption (ABE) schemes, discussing types of blockchains, fundamentals of blockchain, and how blockchains are constructed. Comprised of 16 chapters, the text provides an overview of the components that go into creating a dual ABE system of encryption proofs within the following: composite bilinear groups, dual pairing vector space framework, matrix pairing framework, framework for matrix pairing, and the application of cryptographic scheme on blockchain. The team of authors discuss the basic construction components of ABE and share the security models, including the selective and semi- adaptive security models, applying these to either prime order or composite order groups. The book also discusses the tools used for converting a composite order ABE scheme to prime order and an adaptive secure ABE scheme based on prime order. In Attribute-based Encryption (ABE), readers can expect to find information on: Mathematical background of ABE, covering group and cyclic group, elliptic curves, curve selection, supersingular curves, ordinary curves, and weil and tate pairing Basic construction components of ABE, covering access structure, monotone Boolean formula, linear secret-sharing scheme, and ordered binary decision diagram Tools for converting composite order ABE schemes to prime order, covering security assumptions and conversion based on vectors for preliminaries, scheme construction, and security proof technique Foundations of blockchain technology, covering blocks, miners, hash functions, and public key cryptography Attribute-based Encryption (ABE) is an essential resource for professionals working in the field of design and cybersecurity who wish to understand how to use blockchain and the ABE scheme to provide fine-grained access control in outsourced data on third-party cloud servers.

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

by Timo Steffens

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Auction Based Resource Provisioning in Cloud Computing (SpringerBriefs in Computer Science)

by Dinesh Kumar Gaurav Baranwal Zahid Raza Deo Prakash Vidyarthi

The book, while introducing readers to the auction mechanism for resource provisioning in cloud computing, also endeavors to provide structured literature on the subject. Since various models have been proposed, it will help readers to formulate the cloud resource provisioning problem using the auction approach. The book also discusses challenges for resource provisioning in detail, helping to shape future research. The target audience for this book includes computer scientists, economists, industry professionals, research scholars, and postgraduate students. Computer science readers of this book will come to see that economics-based method are quite helpful in computer science, especially for resource provisioning. Readers with a cloud computing background will come to recognize the importance of dynamic pricing, the specific benefits of auctions, and how to formulate auctions for cloud computing. Lastly, readers from the economics community will come to understand their role in cloud computing, as well as where and how they can contribute.

Auction Design for the Wireless Spectrum Market (SpringerBriefs in Computer Science)

by Qian Zhang Peng Lin Xiaojun Feng

This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reusability, divisibility, composite effect and marginal effect, while also proposing how to build economic incentives into the network architecture and protocols in order to optimize the efficiency of wireless systems. Three scenarios for designing new auctions are demonstrated. First, a truthful double auction scheme for spectrum trading considering both the heterogeneous propagation properties of channels and spatial reuse is proposed. In the second scenario, a framework is designed to enable spectrum group secondary users with a limited budget. Finally, a flexible auction is created enabling operators to purchase the right amounts of spectrum at the right prices according to their users' dynamic demands. Both concise and comprehensive, Auction Design for the Wireless Spectrum Market is suited for professionals and researchers working with wireless communications and networks. It is also a useful tool for advanced-level students interested in spectrum and networking issues.

Refine Search

Showing 6,726 through 6,750 of 62,757 results