Home > Computer & Internet > Computer programming / software development > Games development & programming > Cybersecurity and High-Performance Computing Environments
7%
Cybersecurity and High-Performance Computing Environments

Cybersecurity and High-Performance Computing Environments

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

In this fast-paced global economy, academia and industry must innovate to evolve and succeed. Today's researchers and industry experts are seeking transformative technologies to meet the challenges of tomorrow. Cutting-edge technological advances in cybersecurity solutions aid in enabling the security of complex heterogeneous high-performance computing (HPC) environments. On the other hand, HPC facilitates powerful and intelligent innovative models for reducing time to response to identify and resolve a multitude of potential, newly emerging cyberattacks.

Cybersecurity and High-Performance Computing Environments provides a collection of the current and emergent research innovations, practices, and applications focusing on the interdependence of cybersecurity and HPC domains for discovering and resolving new emerging cyber-threats.

KEY FEATURES

  • Represents a substantial research contribution to the state-of-the-art solutions for addressing the threats to confidentiality, integrity, and availability (CIA triad) in HPC environments
  • Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent, multifaceted, anomalous, and malicious characteristics

The content will help university students, researchers, and professionals understand how HPC research fits broader cybersecurity objectives and vice versa.


About the Author:

Jean-Luc Gaudiot received the Diplôme d'Ingénieur from the École Supérieure d'Ingénieurs en Electronique et Electrotechnique, Paris, France in 1976 and the M.S. and Ph.D. degrees in Computer Science from UCLA in 1977 and 1982, respectively. He is currently a Distinguished Professor in the Department of Electrical Engineering and Computer Science at UC Irvine. Prior to joining UCI in 2002, he was Professor of Electrical Engineering at the University of Southern California since 1982. His research interests include multithreaded architectures, fault-tolerant multiprocessors, and the implementation of reconfigurable architectures. He has published over 250 journal and conference papers.
His research has been sponsored by NSF, DoE, and DARPA, as well as a number of industrial companies. He has served the community in various positions and was the President of the IEEE Computer Society in 2017.

Kuan-Ching Li is a Distinguished Professor in the Dept of Computer Science and Information Engineering at Providence University, Taiwan, where he also serves as the Director of the High-Performance Computing and Networking Center. He published more than 320 scientific papers and articles and is co-author or co-editor of more than 30 books published by leading publishers. In addition, he is the Editor in Chief of the Connection Science (Taylor & Francis) and serves as an associate editor for several leading journals, as also actively involved in various capacities in the organization of several national and international conferences in several countries. He is a Fellow of IET and a Senior Member of the IEEE. Professor Li's research interests include parallel and distributed computing, Big Data, and emerging technologies.

Dr. Nitin Sukhija is an associate professor in Dept. of Computer Science and the director of Center for Cybersecurity and Advanced Computing (C2AC) at SRU. He received his doctorate in Computer Science from Mississippi State University majoring in High Performance Computing in 2015. His areas of expertise are high performance computing, dynamic load balancing, performance modeling, prediction and evaluation, robustness and resilience analysis, cybersecurity and big data analytics. Dr. Sukhija received his MBA degree in Information Systems from San Diego State University (2009), and MS degree in Computer Science majoring in Computing from National University, San Diego (2010). Dr. Sukhija has been involved in research and management of various projects pertaining to the HPC and cybersecurity challenges in industry and academia for over two decades. Dr. Sukhija's research is recognized by publications in high impact peer reviewed IEEE and ACM conferences, journals and book chapters. Dr. Sukhija is recipient of research, career awards and fellowships. He is currently serving as organizing committee member and reviewer for many esteemed conferences. He is currently serving as the co-chair for the ACM SIGHPC Education Chapter workshop committee and has been active in the planning and participation in Workshops series at the SC, ISC and other conferences.

Elizabeth Bautista is the manager for the Operations Technology Group (OTG) at Lawrence Berkeley National Lab's National Energy Research Scientific Computing (NERSC) Center (www.nersc.gov). The group of Site Reliability Engineers ensures 24x7 accessibility, reliability, and security of NERSC's High Performance Systems, data storage systems, and the facility environment. Bautista's Data Team manages a 125 TB Elastic/VictoriaMetrics based data warehouse infrastructure that collects at a rate of 25,000 - 400,000 data points/second depending on the source. The types of datasets range from the facility environment (power, temperature, humidity) to storage I/O to system logs of the HPC systems and support services. The analysis of the real-time data provides alerts to manage the facility, and the archived data is correlated to provide business decisions and future trends. Bautista supports programs that seek to involve minorities and women in STEM and advocates that the next generation of professionals has practical hands-on training as part of their education. In her career, she has served as a member of the Lab's Computing Science Diversity Group, is a member of Women Scientists and Engineers, was a delegate in the Council of University of California Staff Assemblies (CUCSA), a staff advocate group, she champions issues of retention and diversity and is the founder of Filipinas in Computing, a community in the Grace Hopper Conference. Bautista was named one of the 100 most influential Filipina Women Globally in 2015. She has a B.S. in Computer Information Systems and an M.B.A. in Technical Management both from Golden Gate University.


Best Sellers



Product Details
  • ISBN-13: 9780367711504
  • Publisher: Taylor & Francis
  • Publisher Imprint: CRC Press
  • Height: 234 mm
  • No of Pages: 374
  • Spine Width: 22 mm
  • Weight: 729 gr
  • ISBN-10: 0367711508
  • Publisher Date: 08 Apr 2022
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Integrated Innovations, Practices, and Applications
  • Width: 156 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cybersecurity and High-Performance Computing Environments
Taylor & Francis -
Cybersecurity and High-Performance Computing Environments
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity and High-Performance Computing Environments

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!