Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Anti-fragile ICT Systems
Taschenbuch von Kjell Jørgen Hole
Sprache: Englisch

21,39 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Aktuell nicht verfügbar

Kategorien:
Beschreibung
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.

The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix¿s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numentäs anomaly detection software show that cloud computing is essential to achieving anti-fragility forclasses of events with negative impacts.
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.

The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix¿s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numentäs anomaly detection software show that cloud computing is essential to achieving anti-fragility forclasses of events with negative impacts.
Über den Autor

Kjell Jørgen Hole holds a full-time position as a professor at the Department of Informatics, University of Bergen (UiB) and a part-time position as the head of the security department at the Simula Research Laboratory in Oslo. At the time of this writing, he is part of a joint effort between UiB and Simula to form a new cyber security research group.

While Kjell completed his PhD in coding theory at UiB, he did most of his thesis work at the University of California, San Diego, where he worked at the Center for Magnetic Recording Research (CMRR).

Kjell was also a postdoctoral researcher at IBM Almaden Research Center in Silicon Valley, where he conducted research on convolutional codes and artificial neural networks. Later, he worked on trellis coded modulation at the Norwegian University of Science and Technology. During this period, Kjell mainly published his research in IEEE Transactions on Information Theory and IEEE Transactions on Communications.

Kjell eventually switched fields from coding theory to cyber security because he wanted to pursue more applied research. His first research group in the field of security became "infamous" in Norway for a few years because it shattered local myths about information technology systems' high degree of security and privacy. The group published articles in the IEEE magazines Security & Privacy and Computer.

Kjell enjoys teaching and working with students. Through the years he has supervised many master's and PhD students. At UiB, he developed and taught courses and seminars in introductory programming, coding theory, information security, anti-fragile systems, and communication standards such as Wi-Fi and Bluetooth. He has also given many talks to Norwegian industry and written feature articles about security in Norwegian newspapers.

Together with two of his PhD students, Kjell founded a security consultancy. Today, he is a board member of mCASH, a company operating a mobile payment solution in Norway.

Zusammenfassung

First book to introduce and analyze anti-fragile ICT systems

Contains a chapter on Netflix's pioneering work to create a system with anti-fragility to downtime

Two chapters on a new online learning algorithm to quickly detect system anomalies

Includes supplementary material: [...]

Inhaltsverzeichnis
Preface.- Part I: The Concept of Anti-Fragility: 1 Introduction.- 2 Achieving Anti-Fragility.- 3 The Need to Build Trust.- 4 Principles Ensuring Anti-Fragility.- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions.- 6 An Anti-Fragile e-Government System.- 7 Anti-Fragile Cloud-Based Telecom Systems.- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading.- 9 Robustness to Malware Reinfections.- 10 Anti-Fragility to Malware Spreading.- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm.- 12 Detecting Anomalies with the CLA.- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work.- About the Author.- References.- Index.
Details
Erscheinungsjahr: 2016
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Reihe: Simula SpringerBriefs on Computing
Inhalt: xviii
151 S.
22 s/w Illustr.
22 farbige Illustr.
151 p. 44 illus.
22 illus. in color.
ISBN-13: 9783319300689
ISBN-10: 3319300687
Sprache: Englisch
Herstellernummer: 978-3-319-30068-9
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Hole, Kjell Jørgen
Auflage: 1st ed. 2016
Hersteller: Springer International Publishing
Springer International Publishing AG
Simula SpringerBriefs on Computing
Maße: 235 x 155 x 10 mm
Von/Mit: Kjell Jørgen Hole
Erscheinungsdatum: 29.03.2016
Gewicht: 0,271 kg
Artikel-ID: 103979882
Über den Autor

Kjell Jørgen Hole holds a full-time position as a professor at the Department of Informatics, University of Bergen (UiB) and a part-time position as the head of the security department at the Simula Research Laboratory in Oslo. At the time of this writing, he is part of a joint effort between UiB and Simula to form a new cyber security research group.

While Kjell completed his PhD in coding theory at UiB, he did most of his thesis work at the University of California, San Diego, where he worked at the Center for Magnetic Recording Research (CMRR).

Kjell was also a postdoctoral researcher at IBM Almaden Research Center in Silicon Valley, where he conducted research on convolutional codes and artificial neural networks. Later, he worked on trellis coded modulation at the Norwegian University of Science and Technology. During this period, Kjell mainly published his research in IEEE Transactions on Information Theory and IEEE Transactions on Communications.

Kjell eventually switched fields from coding theory to cyber security because he wanted to pursue more applied research. His first research group in the field of security became "infamous" in Norway for a few years because it shattered local myths about information technology systems' high degree of security and privacy. The group published articles in the IEEE magazines Security & Privacy and Computer.

Kjell enjoys teaching and working with students. Through the years he has supervised many master's and PhD students. At UiB, he developed and taught courses and seminars in introductory programming, coding theory, information security, anti-fragile systems, and communication standards such as Wi-Fi and Bluetooth. He has also given many talks to Norwegian industry and written feature articles about security in Norwegian newspapers.

Together with two of his PhD students, Kjell founded a security consultancy. Today, he is a board member of mCASH, a company operating a mobile payment solution in Norway.

Zusammenfassung

First book to introduce and analyze anti-fragile ICT systems

Contains a chapter on Netflix's pioneering work to create a system with anti-fragility to downtime

Two chapters on a new online learning algorithm to quickly detect system anomalies

Includes supplementary material: [...]

Inhaltsverzeichnis
Preface.- Part I: The Concept of Anti-Fragility: 1 Introduction.- 2 Achieving Anti-Fragility.- 3 The Need to Build Trust.- 4 Principles Ensuring Anti-Fragility.- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions.- 6 An Anti-Fragile e-Government System.- 7 Anti-Fragile Cloud-Based Telecom Systems.- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading.- 9 Robustness to Malware Reinfections.- 10 Anti-Fragility to Malware Spreading.- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm.- 12 Detecting Anomalies with the CLA.- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work.- About the Author.- References.- Index.
Details
Erscheinungsjahr: 2016
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Reihe: Simula SpringerBriefs on Computing
Inhalt: xviii
151 S.
22 s/w Illustr.
22 farbige Illustr.
151 p. 44 illus.
22 illus. in color.
ISBN-13: 9783319300689
ISBN-10: 3319300687
Sprache: Englisch
Herstellernummer: 978-3-319-30068-9
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Hole, Kjell Jørgen
Auflage: 1st ed. 2016
Hersteller: Springer International Publishing
Springer International Publishing AG
Simula SpringerBriefs on Computing
Maße: 235 x 155 x 10 mm
Von/Mit: Kjell Jørgen Hole
Erscheinungsdatum: 29.03.2016
Gewicht: 0,271 kg
Artikel-ID: 103979882
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte