Computers & Internet Books:

Trustworthy Autonomic Computing

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Format:

Hardback
$299.00
Available from supplier

The item is brand new and in-stock with one of our preferred suppliers. The item will ship from a Mighty Ape warehouse within the timeframe shown.

Usually ships in 3-4 weeks
Free Delivery with Primate
Join Now

Free 14 day free trial, cancel anytime.

Buy Now, Pay Later with:

4 payments of $74.75 with Afterpay Learn more

6 weekly interest-free payments of $49.83 with Laybuy Learn more

Availability

Delivering to:

Estimated arrival:

  • Around 18-28 June using International Courier

Description

The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.

Author Biography:

Thaddeus Eze is a cybersecurity senior lecturer and researcher at the Computer Science Department, University of Chester, UK. He is the programme leader for MSc Cybersecurity (Conversion) and the postgraduate assessment officer for the Computer Science department. His research interests include cybersecurity awareness and training, trustworthy autonomic computing, ethical hacking, cryptography, and digital forensics. He is a member of CIISec and was the Vice Chair of the IEEE Young Professionals, UK & Ireland Section from 2014 to 2022. He's the Convener and organiser of the IEEE UK & Ireland YP Postgraduate STEM Research Symposium (three successful editions already organised). He was actively involved in organising the first ever UK Pitch Bootcamp and the IEEE Professional Development Networking Workshop 2017. He is a 2004 graduate of Anambra State University, Nigeria, with BSc (Upper 2nd Class) in Computer Science. He holds an MSc (with Distinction, 2010) in Mobile Computing and Communications and a PhD in Trustworthy Autonomics from the University of Greenwich, London, UK.
Release date NZ
January 30th, 2023
Author
Audiences
  • Professional & Vocational
  • Tertiary Education (US: College)
Pages
264
ISBN-13
9781785618833
Product ID
35934486

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

Filed under...