Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham : Springer
    UID:
    b3kat_BV043504172
    Format: 1 Online-Ressource (xviii, 151 Seiten) , Illustrationen, Diagramme
    ISBN: 9783319300702 , 9783319300689
    Series Statement: Simula SpringerBriefs on Computing volume 1
    Note: Open Access bei doabooks
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Informatik ; Computersimulation ; Modellieren ; Informationssystem ; Kommunikationssystem ; Künstliche Intelligenz
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    almafu_9958071845202883
    Format: 1 online resource (XVIII, 151 pages) ; , 44 illustrations, 22 illustrations in colour; digital, PDF file(s).
    Edition: 1st ed. 2016.
    ISBN: 3-319-30070-9
    Series Statement: Simula SpringerBriefs on Computing, 1
    Content: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Note: Bibliographic Level Mode of Issuance: Monograph , Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. , Also available in print form. , English
    Additional Edition: ISBN 3-319-30068-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing :
    UID:
    almahu_9947388554302882
    Format: XVIII, 151 p. 44 illus., 22 illus. in color. , online resource.
    Edition: 1st ed. 2016.
    ISBN: 9783319300702
    Series Statement: Simula SpringerBriefs on Computing ; 1
    Content: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Note: Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319300689
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    edoccha_9958071845202883
    Format: 1 online resource (XVIII, 151 pages) ; , 44 illustrations, 22 illustrations in colour; digital, PDF file(s).
    Edition: 1st ed. 2016.
    ISBN: 3-319-30070-9
    Series Statement: Simula SpringerBriefs on Computing, 1
    Content: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Note: Bibliographic Level Mode of Issuance: Monograph , Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. , Also available in print form. , English
    Additional Edition: ISBN 3-319-30068-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    edocfu_9958071845202883
    Format: 1 online resource (XVIII, 151 pages) ; , 44 illustrations, 22 illustrations in colour; digital, PDF file(s).
    Edition: 1st ed. 2016.
    ISBN: 3-319-30070-9
    Series Statement: Simula SpringerBriefs on Computing, 1
    Content: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Note: Bibliographic Level Mode of Issuance: Monograph , Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. , Also available in print form. , English
    Additional Edition: ISBN 3-319-30068-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783319100609?
Did you mean 9783319030685?
Did you mean 9783319300009?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages