作者: Yu-Hong Chen , Kuang-Tse Chen , Lei Wang
DOI: 10.1007/978-3-642-35473-1_18
关键词:
摘要: Protective measures for server invasions should not solely focus on events before an invasion occur. Recording and monitoring successful with endless streams of security mechanisms be employed attentively to reduce the loss data due intrusion attacks any system. This paper implementation embedded system technology developed in a host control module group which entire achieves coordinated allocation resources combined larger number hosts designed meet demand. The switching uses load balancing prevent failures, errors, interruptions, accompanied ever so important theory fault-tolerance grace degradation purposes.