Introduction to reliable and secure distributed programming / (Record no. 91521)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02014 a2200229 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240207b2011 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783642423277 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.14 CAC-C |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Cachin, Christian |
245 ## - TITLE STATEMENT | |
Title | Introduction to reliable and secure distributed programming / |
Statement of responsibility, etc. | Christian Cachin, Rachid Guerraoui and Luis Rodrigues |
250 ## - EDITION STATEMENT | |
Edition statement | 2 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Germany |
Name of publisher, distributor, etc. | Springer |
Date of publication, distribution, etc. | 2011 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 367 p. |
500 ## - GENERAL NOTE | |
General note | In modern computing, a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.<br/><br/>Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding<br/><br/>This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance". |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer programming |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithm Analysis and Problem Complexity |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Guerraoui, Rachid |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Rodrigues, Luis |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Source of classification or shelving scheme | Dewey Decimal Classification |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
Withdrawn status |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | 003-007 | BITS Pilani Hyderabad | BITS Pilani Hyderabad | Text & Reference Section (Student cannot borrow these books) | 07/02/2024 | 005.14 CAC-C | 48155 | 13/07/2024 | 07/02/2024 | Course Reference Books |