Anti-fragile Ict Systems by Kjell Jorgen HoleAnti-fragile Ict Systems by Kjell Jorgen Hole

Anti-fragile Ict Systems

byKjell Jorgen Hole

Paperback | March 29, 2016

Pricing and Purchase Info

$32.80 online 
$35.50 list price save 7%
Earn 164 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.

The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix's media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta's anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.

Kjell Jorgen Hole holds a full-time position as a professor at the Department of Informatics, University of Bergen (UiB) and a part-time position as the head of the security department at the Simula Research Laboratory in Oslo. At the time of this writing, he is part of a joint effort between UiB and Simula to form a new cyber security...
Title:Anti-fragile Ict SystemsFormat:PaperbackDimensions:151 pagesPublished:March 29, 2016Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319300687

ISBN - 13:9783319300689


Table of Contents

Preface.-  Part I : The Concept of Anti-Fragility:  1 Introduction.- 2 Achieving Anti-Fragility.- 3 The Need to Build Trust.- 4 Principles Ensuring Anti-Fragility.- Part II : Anti-Frag ility to Downtime:  5 Anti-Fragile Cloud Solutions.- 6 An Anti-Fragile e-Government System.- 7 Anti-Fragile Cloud-Based Telecom Systems.- Part III: Anti-Fragility to Malware:  8 Robustness to Malware Spreading.- 9 Robustness to Malware Reinfections.- 10 Anti-Fragility to Malware Spreading.- Part IV : Anomaly Detection:  11 The Cortical Learning Algorithm.- 12 Detecting Anomalies with the CLA.- Part V : Future Anti-Fragile Systems:  13 Summary and Future Work.- About the Author.- References.- Index.