0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (10)
  • R250 - R500 (39)
  • R500+ (3,100)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Advanced Computer Performance Modeling and Simulation (Hardcover): Kallol Bagchi, Jean Walrand, George Zobrist Advanced Computer Performance Modeling and Simulation (Hardcover)
Kallol Bagchi, Jean Walrand, George Zobrist
R3,197 Discovery Miles 31 970 Ships in 12 - 17 working days

Addresses the major issues involved in computer design and architectures. Dealing primarily with theory, tools, and techniques as related to advanced computer systems, it provides tutorials and surveys and relates new important research results. Each chapter provides background information, describes and analyzes important work done in the field, and provides important direction to the reader on future work and further readings. The topics covered include hierarchical design schemes, parallel and distributed modeling and simulation, parallel simulation tools and techniques, theoretical models for formal and performance modeling, and performance evaluation techniques.

Well-Quasi Orders in Computation, Logic, Language and Reasoning - A Unifying Concept of Proof Theory, Automata Theory, Formal... Well-Quasi Orders in Computation, Logic, Language and Reasoning - A Unifying Concept of Proof Theory, Automata Theory, Formal Languages and Descriptive Set Theory (Paperback, 1st ed. 2020)
Peter M. Schuster, Monika Seisenberger, Andreas Weiermann
R5,230 Discovery Miles 52 300 Ships in 10 - 15 working days

This book bridges the gaps between logic, mathematics and computer science by delving into the theory of well-quasi orders, also known as wqos. This highly active branch of combinatorics is deeply rooted in and between many fields of mathematics and logic, including proof theory, commutative algebra, braid groups, graph theory, analytic combinatorics, theory of relations, reverse mathematics and subrecursive hierarchies. As a unifying concept for slick finiteness or termination proofs, wqos have been rediscovered in diverse contexts, and proven to be extremely useful in computer science. The book introduces readers to the many facets of, and recent developments in, wqos through chapters contributed by scholars from various fields. As such, it offers a valuable asset for logicians, mathematicians and computer scientists, as well as scholars and students.

Intelligent Vehicular Networks and Communications - Fundamentals, Architectures and Solutions (Paperback): Anand Paul, Naveen... Intelligent Vehicular Networks and Communications - Fundamentals, Architectures and Solutions (Paperback)
Anand Paul, Naveen Chilamkurti, Alfred Daniel, Seungmin Rho
R1,795 R1,698 Discovery Miles 16 980 Save R97 (5%) Ships in 12 - 17 working days

Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today's Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles.

Navigation Design and SEO for Content-Intensive Websites - A Guide for an Efficient Digital Communication (Paperback): Mario... Navigation Design and SEO for Content-Intensive Websites - A Guide for an Efficient Digital Communication (Paperback)
Mario Perez-Montoro, Lluis Codina
R1,566 R1,486 Discovery Miles 14 860 Save R80 (5%) Ships in 12 - 17 working days

Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.

Secrets of a Cyber Security Architect (Hardcover): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Hardcover)
Brook S. E. Schoenfield
R1,836 Discovery Miles 18 360 Ships in 12 - 17 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback): Carl Young Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback)
Carl Young
R1,536 Discovery Miles 15 360 Ships in 12 - 17 working days

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Software Architecture 2 (Hardcover): MC Oussalah Software Architecture 2 (Hardcover)
MC Oussalah
R3,901 Discovery Miles 39 010 Ships in 12 - 17 working days

Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.

Big Data - Principles and Paradigms (Paperback): Rajkumar Buyya, Rodrigo N. Calheiros, Amir Vahid Dastjerdi Big Data - Principles and Paradigms (Paperback)
Rajkumar Buyya, Rodrigo N. Calheiros, Amir Vahid Dastjerdi
R1,754 Discovery Miles 17 540 Ships in 12 - 17 working days

Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data's full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.

Embedded Systems Design using the MSP430FR2355 LaunchPad (TM) (Hardcover, 2nd ed. 2023): Brock J. Lameres Embedded Systems Design using the MSP430FR2355 LaunchPad (TM) (Hardcover, 2nd ed. 2023)
Brock J. Lameres
R1,714 Discovery Miles 17 140 Ships in 9 - 15 working days

This textbook for courses in Embedded Systems introduces students to necessary concepts, through a hands-on approach. LEARN BY EXAMPLE - This book is designed to teach the material the way it is learned, through example. Every concept is supported by numerous programming examples that provide the reader with a step-by-step explanation for how and why the computer is doing what it is doing. LEARN BY DOING - This book targets the Texas Instruments MSP430 microcontroller. This platform is a widely popular, low-cost embedded system that is used to illustrate each concept in the book. The book is designed for a reader that is at their computer with an MSP430FR2355 LaunchPadTM Development Kit plugged in so that each example can be coded and run as they learn. LEARN BOTH ASSEMBLY AND C - The book teaches the basic operation of an embedded computer using assembly language so that the computer operation can be explored at a low-level. Once more complicated systems are introduced (i.e., timers, analog-to-digital converters, and serial interfaces), the book moves into the C programming language. Moving to C allows the learner to abstract the operation of the lower-level hardware and focus on understanding how to "make things work". BASED ON SOUND PEDAGOGY - This book is designed with learning outcomes and assessment at its core. Each section addresses a specific learning outcome that the student should be able to "do" after its completion. The concept checks and exercise problems provide a rich set of assessment tools to measure student performance on each outcome.

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,345 Discovery Miles 33 450 Ships in 10 - 15 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

A Synergistic Framework for Hardware IP Privacy and Integrity Protection (Paperback, 1st ed. 2020): Meng Li, David Z. Pan A Synergistic Framework for Hardware IP Privacy and Integrity Protection (Paperback, 1st ed. 2020)
Meng Li, David Z. Pan
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.

The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Paperback, 1st ed. 2020): Sylvain... The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Paperback, 1st ed. 2020)
Sylvain Clerc, Thierry Di Gilio, Andreia Cathelin
R3,730 Discovery Miles 37 300 Ships in 10 - 15 working days

This book discusses the advantages and challenges of Body-Biasing for integrated circuits and systems, together with the deployment of the design infrastructure needed to generate this Body-Bias voltage. These new design solutions enable state of the art energy efficiency and system flexibility for the latest applications, such as Internet of Things and 5G communications.

Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems (Hardcover, 1st ed. 2020): Marilyn Wolf, Dimitrios... Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems (Hardcover, 1st ed. 2020)
Marilyn Wolf, Dimitrios Serpanos
R2,422 Discovery Miles 24 220 Ships in 10 - 15 working days

This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people. Offers readers a unified view of safety and security, from basic concepts through research challenges; Provides a detailed comparison of safety and security methodologies; Describes a comprehensive threat model including attacks, design errors, and faults; Identifies important commonalities and differences in safety and security engineering.

Trust & Fault in Multi Layered Cloud Computing Architecture (Paperback, 1st ed. 2020): Punit Gupta, Pradeep Kumar Gupta Trust & Fault in Multi Layered Cloud Computing Architecture (Paperback, 1st ed. 2020)
Punit Gupta, Pradeep Kumar Gupta
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing; Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system; Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.

Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems (Hardcover): K Suganthi, R. Karthik, G... Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems (Hardcover)
K Suganthi, R. Karthik, G Rajesh, Peter Ho Chiung Ching
R3,337 Discovery Miles 33 370 Ships in 12 - 17 working days

This book offers the latest advances and results in the fields of Machine Learning and Deep Learning for Wireless Communication and provides positive and critical discussions on the challenges and prospects. It provides a broad spectrum in understanding the improvements in Machine Learning and Deep Learning that are motivating by the specific constraints posed by wireless networking systems. The book offers an extensive overview on intelligent Wireless Communication systems and its underlying technologies, research challenges, solutions, and case studies. It provides information on intelligent wireless communication systems and its models, algorithms and applications. The book is written as a reference that offers the latest technologies and research results to various industry problems.

Models, Methods, and Tools for Complex Chip Design - Selected Contributions from FDL 2012 (Hardcover, 2014 ed.): Jan Haase Models, Methods, and Tools for Complex Chip Design - Selected Contributions from FDL 2012 (Hardcover, 2014 ed.)
Jan Haase
R4,834 Discovery Miles 48 340 Ships in 12 - 17 working days

This book brings together a selection of the best papers from the fifteenth edition of the Forum on specification and Design Languages Conference (FDL), which was held in September 2012 at Vienna University of Technology, Vienna, Austria. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems.

Information Storage - A Multidisciplinary Perspective (Paperback, 1st ed. 2020): Cornelia S. Grosse, Rolf Drechsler Information Storage - A Multidisciplinary Perspective (Paperback, 1st ed. 2020)
Cornelia S. Grosse, Rolf Drechsler
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book examines some of the underlying processes behind different forms of information management, including how we store information in our brains, the impact of new technologies such as computers and robots on our efficiency in storing information, and how information is stored in families and in society. The editors brought together experts from a variety of disciplines. While it is generally agreed that information reduces uncertainties and that the ability to store it safely is of vital importance, these authors are open to different meanings of "information": computer science considers the bit as the information block; neuroscience emphasizes the importance of information as sensory inputs that are processed and transformed in the brain; theories in psychology focus more on individual learning and on the acquisition of knowledge; and finally sociology looks at how interpersonal processes within groups or society itself come to the fore. The book will be of value to researchers and students in the areas of information theory, artificial intelligence, and computational neuroscience.

Model and Design of Improved Current Mode Logic Gates - Differential and Single-ended (Paperback, 1st ed. 2020): Kirti Gupta,... Model and Design of Improved Current Mode Logic Gates - Differential and Single-ended (Paperback, 1st ed. 2020)
Kirti Gupta, Neeta Pandey, Maneesha Gupta
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book presents MOSFET-based current mode logic (CML) topologies, which increase the speed, and lower the transistor count, supply voltage and power consumption. The improved topologies modify the conventional PDN, load, and the current source sections of the basic CML gates. Electronic system implementation involves embedding digital and analog circuits on a single die shifting towards mixed-mode circuit design. The high-resolution, low-power and low-voltage analog circuits are combined with high-frequency complex digital circuits, and the conventional static CMOS logic generates large current spikes during the switching (also referred to as digital switching noise), which degrade the resolution of the sensitive analog circuits via supply line and substrate coupling. This problem is exacerbated further with scaling down of CMOS technology due to higher integration levels and operating frequencies. In the literature, several methods are described to reduce the propagation of the digital switching noise. However, in high-resolution applications, these methods are not sufficient. The conventional CMOS static logic is no longer an effective solution, and therefore an alternative with reduced current spikes or that draws a constant supply current must be selected. The current mode logic (CML) topology, with its unique property of requiring constant supply current, is a promising alternative to the conventional CMOS static logic.

The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover): Parikshit N. Mahalle, Gitanjali Rahul Shinde,... The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover)
Parikshit N. Mahalle, Gitanjali Rahul Shinde, Nancy Ambritta P., Arvind Vinayak Deshpande
R1,579 Discovery Miles 15 790 Ships in 12 - 17 working days

Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application

High-speed Serial Buses in Embedded Systems (Paperback, 1st ed. 2020): Feng Zhang High-speed Serial Buses in Embedded Systems (Paperback, 1st ed. 2020)
Feng Zhang
R3,457 Discovery Miles 34 570 Ships in 10 - 15 working days

This book describes the most frequently used high-speed serial buses in embedded systems, especially those used by FPGAs. These buses employ SerDes, JESD204, SRIO, PCIE, Aurora and SATA protocols for chip-to-chip and board-to-board communication, and CPCIE, VPX, FC and Infiniband protocols for inter-chassis communication. For each type, the book provides the bus history and version info, while also assessing its advantages and limitations. Furthermore, it offers a detailed guide to implementing these buses in FPGA design, from the physical layer and link synchronization to the frame format and application command. Given its scope, the book offers a valuable resource for researchers, R&D engineers and graduate students in computer science or electronics who wish to learn the protocol principles, structures and applications of high-speed serial buses.

Supercomputing - 6th Russian Supercomputing Days, RuSCDays 2020, Moscow, Russia, September 21-22, 2020, Revised Selected Papers... Supercomputing - 6th Russian Supercomputing Days, RuSCDays 2020, Moscow, Russia, September 21-22, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Vladimir Voevodin, Sergey Sobolev
R3,042 Discovery Miles 30 420 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6th Russian Supercomputing Days, RuSCDays 2020, held in Moscow, Russia, in September 2020.* The 51 revised full and 4 revised short papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in the following topical sections: parallel algorithms; supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing. * The conference was held virtually due to the COVID-19 pandemic.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition)
Bongsik Shin
R1,445 Discovery Miles 14 450 Ships in 12 - 17 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Organizational Network Analysis - Auditing Intangible Resources (Paperback): Anna Ujwary-Gil Organizational Network Analysis - Auditing Intangible Resources (Paperback)
Anna Ujwary-Gil
R1,278 Discovery Miles 12 780 Ships in 12 - 17 working days

This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge.

Getting Started with NSX-T: Logical Routing and Switching - The Basic Principles of Building Software-Defined Network... Getting Started with NSX-T: Logical Routing and Switching - The Basic Principles of Building Software-Defined Network Architectures with VMware NSX-T (Paperback, 1st ed.)
Iwan Hoogendoorn
R1,355 R1,106 Discovery Miles 11 060 Save R249 (18%) Ships in 10 - 15 working days

This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software. The book is the first in a series that will teach you the basics of NSX-T, which is an update of VMware's original software-defined networking (SDN) architecture aimed at making networks agile and flexible. You will become familiar with VMware's software-defined data center (SDDC) ecosystem and how NSX-T fits in. You will understand NSX-T components such as NSX-T Manager, NSX-T Edge Transport Nodes, and NSX-T Host Transport Nodes. And you will learn how to install and configure network services such as East/West and North/South routing capabilities, layer two switching, VRF, EVPN, multicast, and layer two bridging. The book provides best practices on how to configure routing and switching features, and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure. The book explains security, advanced network features, and multi-site capabilities and demonstrates how network and security services can be offered across multiple on-premise locations with a single pane of glass for networking and security policy management. The interface with public cloud services is discussed and the book explains NSX-T operation in an on-premise private cloud and positioning and integrating NSX-T on a public cloud (off premises). What You Will Learn Understand how NSX-T fits in the VMware SDDC ecosystem Know what NSX-T is, its components, and the terminology used Install NSX-T Configure NSX-T network services Manage the NSX-T network Who This Book Is For Virtualization administrators, system integrators, and network administrators

System-Scenario-based Design Principles and Applications (Paperback, 1st ed. 2020): Francky Catthoor, Twan Basten, Nikolaos... System-Scenario-based Design Principles and Applications (Paperback, 1st ed. 2020)
Francky Catthoor, Twan Basten, Nikolaos Zompakis, Marc Geilen, Per Gunnar Kjeldsberg
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

This book introduces a generic and systematic design-time/run-time methodology for handling the dynamic nature of modern embedded systems, without adding large safety margins in the design. The techniques introduced can be utilized on top of most existing static mapping methodologies to deal effectively with dynamism and to increase drastically their efficiency. This methodology is based on the concept of system scenarios, which group system behaviors that are similar from a multi-dimensional cost perspective, such as resource requirements, delay, and energy consumption. Readers will be enabled to design systems capable to adapt to current inputs, improving system quality and/or reducing cost, possibly learning on-the-fly during execution. Provides an effective solution to deal with dynamic system design Includes a broad survey of the state-of-the-art approaches in this domain Enables readers to design for substantial cost improvements (e.g. energy reductions), by exploiting system scenarios Demonstrates how the methodology has been applied effectively on various, real design problems in the embedded system context

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The TOGAF standard, version 9.2
Open Group Paperback R2,255 Discovery Miles 22 550
Agile Software Architecture - Aligning…
Muhammad Ali Babar, Alan W. Brown, … Paperback R2,794 R2,257 Discovery Miles 22 570
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues Paperback R4,844 Discovery Miles 48 440
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R926 Discovery Miles 9 260
Constraint Decision-Making Systems in…
Santosh Kumar Das, Nilanjan Dey Hardcover R7,388 Discovery Miles 73 880
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,237 Discovery Miles 12 370
Logic and Computer Design Fundamentals…
M. Morris Mano, Charles Kime, … Paperback R2,614 Discovery Miles 26 140
Advances in Intelligent Systems…
Sergey Yurish Hardcover R2,534 Discovery Miles 25 340
Creativity in Load-Balance Schemes for…
Alberto Garcia-Robledo, Arturo Diaz Perez, … Hardcover R4,279 Discovery Miles 42 790
Heterogeneous Computing - Hardware and…
Mohamed Zahran Hardcover R1,662 Discovery Miles 16 620

 

Partners