Linked e-resources
Details
Table of Contents
Preface
Part I: The Concept of Anti-Fragility: 1 Introduction
2 Achieving Anti-Fragility
3 The Need to Build Trust
4 Principles Ensuring Anti-Fragility
Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions
6 An Anti-Fragile e-Government System
7 Anti-Fragile Cloud-Based Telecom Systems
Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading
9 Robustness to Malware Reinfections
10 Anti-Fragility to Malware Spreading
Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm
12 Detecting Anomalies with the CLA
Part V: Future Anti-Fragile Systems: 13 Summary and Future Work
About the Author
References
Index.
Part I: The Concept of Anti-Fragility: 1 Introduction
2 Achieving Anti-Fragility
3 The Need to Build Trust
4 Principles Ensuring Anti-Fragility
Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions
6 An Anti-Fragile e-Government System
7 Anti-Fragile Cloud-Based Telecom Systems
Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading
9 Robustness to Malware Reinfections
10 Anti-Fragility to Malware Spreading
Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm
12 Detecting Anomalies with the CLA
Part V: Future Anti-Fragile Systems: 13 Summary and Future Work
About the Author
References
Index.