These reviews are the most popular with readers.
All Media Types
For the last:
Linux hardening in hostile networks: server security from TLS to Tor
Rankin K., Addison-Wesley Professional, Boston, MA, 2017. 272 pp. Type: Book (978-0-134173-26-9)
The book’s preface notes that many of the available hardening guides were written some years ago. Its chapters are therefore intended to replace the outdated information found in those guides with recommendations that provide maximum impact ...
SCION: a secure Internet architecture
Perrig A., Szalachowski P., Reischuk R., Chuat L., Springer International Publishing, New York, NY, 2017. 432 pp. Type: Book (978-3-319670-79-9)
Researchers, graduate students, and deep practitioners in the Internet systems domain shouldn’t miss out on this body of work. It describes the essential elements of SCION--“an acronym for scalability, control, and isolation on ne...
Computational phylogenetics: an introduction to designing methods for phylogeny estimation
Warnow T., Cambridge University Press, New York, NY, 2018. 394 pp. Type: Book (978-1-107184-71-8)
Evolutionary biology broadly covers phylogeny or the phylogenetic tree, representing the relationships among individuals or groups of organisms. Specifically, computational phylogenetics deals with the implementation of computational methods and a...
Smart cards, tokens, security and applications (2nd ed.)
Mayes K., Markantonakis K., Springer International Publishing, New York, NY, 2017. 531 pp. Type: Book (978-3-319504-98-8)
This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application development, roll out, and life cycle manage...
Cloud computing and software services: theory and techniques
Ahson S., Ilyas M., CRC Press, Inc., Boca Raton, FL, 2017. 458 pp. Type: Book (978-1-138114-97-5)
Cloud computing and software services
includes many fruitful topics. In 17 chapters, the authors demonstrate their forte with interesting contributions to different branches of cloud computing. The first four chapters serve as an introducti...
The book of why: the new science of cause and effect
Pearl J., Mackenzie D., Basic Books, Inc., New York, NY, 2018. 432 pp. Type: Book (978-0-465097-60-9)
The well-known 20th century scientist J. B. S. Haldane is famously quoted as having said, “Teleology is like a mistress to a biologist: he cannot live without her, but he’s unwilling to be seen with her in public.” Haldane’...
Quantum computing: an environment for intelligent large scale real application
Hassanien A., Elhoseny M., Kacprzyk J., Springer International Publishing, New York, NY, 2018. 505 pp. Type: Book (978-3-319636-38-2)
The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum field theor...
Flash memory integration: performance and energy issues
Boukhobza J., Olivier P., ISTE Press - Elsevier, London, UK, 2017. 266 pp. Type: Book (978-1-785481-24-6)
With the explosion of data in recent years, storage technologies continue to be a critical infrastructure in the world. It is predicted that 44 zettabytes (44 billion terabytes) will be generated in 2020. While most data will be stored on hard dis...
Assessing and improving prediction and classification: theory and algorithms in C++
Masters T., Apress, New York, NY, 2018. 517 pp. Type: Book (978-1-484233-35-1)
There is an increased interest in machine learning (ML) in both academy and industry. One consequence is a greater demand for textbooks and other educational materials that explain the different facets of ML to a heterogeneous readership. While ma...
A ternary unification framework for optimizing TCAM-based packet classification systems
Norige E., Liu A., Torng E. IEEE/ACM Transactions on Networking 26(2): 657-670, 2018. Type: Article
Today, many network devices include a packet classification function to provide various services based on packet headers such as packet filtering, load balancing, and so on. Packet classification includes a rule set consisting of predicates and de...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.