Item type | Current library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|---|
![]() |
BITS Pilani Hyderabad | 003-007 | Text & Reference Section (Student cannot borrow these books) | 005.14 CAC-C (Browse shelf(Opens below)) | EU 59.99. | Available | 48155 |
Browsing BITS Pilani Hyderabad shelves, Shelving location: Text & Reference Section (Student cannot borrow these books), Collection: 003-007 Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.133 SCH-H Java : the complete reference / | 005.133 SCH-H Java : the complete reference / | 005.133 SIE-K Head first java / | 005.14 CAC-C Introduction to reliable and secure distributed programming / | 005.14 MAT-A Foundations of software testing / | 005.14 MAT-A Foundations of software testing / | 005.2 GRA-A Introduction to parallel computing / |
In modern computing, a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.
Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding
This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".
There are no comments on this title.