Shen, Yu, Buford, Akon (eds.): Handbook of Peer-to-Peer Networking (2010)

24 February 2012, dusan

The handbook offers elaborate discussions on fundamentals of peer-to-peer computing models, networks and applications, and provides a comprehensive study on recent advancements, crucial design choices, open problems, and possible solution strategies. It is written by a team of leading international researchers and professionals

Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. In addition, a large range of new applications are under development or being proposed. The underlying architectures share features including decentralization, end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. Trends in information and network technology such as increased performance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforce the capabilities of this P2P paradigm.

The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications, thus providing an exhaustive view of the state-of-the-art of the P2P networking field. Written by leading international experts, the volume contains fifty chapters dedicated to the following topics:

• Introduction to Peer-to-Peer Networking
• Unstructured P2P Overlay Architectures
• Structured P2P Overlay Architectures
• Search and Query Processing
• Incentive Mechanisms
• Trust, Anonymity, and Privacy
• Broadcast and Multicast Services
• Multimedia Content Delivery
• Mobile P2P
• Fault Tolerance in P2P Networks
• Measurement and P2P Traffic Characteristics
• Advanced P2P Computing and Networking

This comprehensive volume serves as an essential reference for researchers and professionals, The book is also suitable for computer science and engineering students at the advanced undergraduate level or higher who are familiar with networking, network protocol concepts, and basic ideas about algorithms.

Edited by Xuemin Shen, Heather Yu, John Buford, Mursalin Akon
Publisher Springer New York Dordrecht Heidelberg London
ISBN 978-0-387-09750-3
1421 pages

publisher

PDF

Gary Hall (ed.): Digitize Me, Visualize Me, Search Me: Open Science and its Discontents (2011-)

11 November 2011, dusan

“One of the aims of the Living Books About Life series is to provide a ‘bridge’ or point of connection, translation, even interrogation and contestation, between the humanities and the sciences. Accordingly, this introduction to Digitize Me, Visualize Me, Search Me takes as its starting point the so-called ‘computational turn’ to data-intensive scholarship in the humanities.

The phrase ‘the computational turn’ has been adopted to refer to the process whereby techniques and methodologies drawn from computer science and related fields – including science visualization, interactive information visualization, image processing, network analysis, statistical data analysis, and the management, manipulation and mining of data – are being increasingly used to produce new ways of approaching and understanding texts in the humanities – what is sometimes thought of as ‘the digital humanities’.” (from Introduction)

Publisher Open Humanities Press
Living Books About Life series

View online (wiki/PDF/HTML articles/videos)
PDF (PDF’d Introduction with hyperlinked articles)

Kevin Mitnick: Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker (2011)

10 November 2011, dusan

“Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies–and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn’t just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI’s net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.”

Written with William L. Simon
Foreword by Steve Wozniak
Publisher Little, Brown and Company, 2011
ISBN 0316134473, 9780316134477

review (J.D. Biersdorfer, The New York Times)

PDF (updated on 2016-12-23)