0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (39)
  • R500+ (3,086)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Principles of Synchronous Digital Hierarchy (Paperback): Rajesh Kumar Jain Principles of Synchronous Digital Hierarchy (Paperback)
Rajesh Kumar Jain
R2,442 Discovery Miles 24 420 Ships in 10 - 15 working days

The book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy, in particular, and the functioning of practical telecommunication systems, in general. The text includes all relevant fundamentals and provides a handy reference for problem solving or defining operations and maintenance strategies. The author covers digital conversion and TDM principles, line coding and digital modulation, signal impairments, and synchronization, as well as emerging systems.

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R5,084 Discovery Miles 50 840 Ships in 10 - 15 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition)
Bongsik Shin
R1,200 R1,133 Discovery Miles 11 330 Save R67 (6%) Ships with 15 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective.

Because of the critical importance of cybersecurity in today’s enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading.

This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter.

FEATURES

Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity

Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP

Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice

Explains subjects in a systematic and practical manner to facilitate understanding

Includes practical exercise questions that can be individual or group assignments within or without a classroom

Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning

The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Table of Contents

1. Networking: Fundamental Concepts

2. Cybersecurity: Fundamentals

3. Essential Layers of Computer Networking

4. IP Address Planning and Management

5. Intermediary Devices

6. Wi-Fi and Cellular Network

7. Ethernet LAN

8. Cybersecurity: Threats

9. Cybersecurity: Network and Host Protection

10. Cybersecurity: Data Protection

11. Fundamentals of Packet Routing

12. Wide Area Network

13. Physical Layer Data Transmissions

Cooperative Cognitive Radio Networks - The Complete Spectrum Cycle (Paperback): Mohamed Ibnkahla Cooperative Cognitive Radio Networks - The Complete Spectrum Cycle (Paperback)
Mohamed Ibnkahla
R2,865 Discovery Miles 28 650 Ships in 10 - 15 working days

Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle provides a solid understanding of the foundations of cognitive radio technology, from spectrum sensing, access, and handoff to routing, trading, and security. Written in a tutorial style with several illustrative examples, this comprehensive book: Gives an overview of cognitive radio systems and explains the different components of the spectrum cycle Features step-by-step analyses of the different algorithms and systems, supported by extensive computer simulations, figures, tables, and references Fulfills the need for a single source of information on all aspects of the spectrum cycle, including the physical, link, medium access, network, and application layers Offering a unifying view of the various approaches and methodologies, Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle presents the state of the art of cognitive radio technology, addressing all phases of the spectrum access cycle.

Telecommunications Cost Management (Hardcover): Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr. Telecommunications Cost Management (Hardcover)
Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr.
R5,078 Discovery Miles 50 780 Ships in 10 - 15 working days

Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to networking managers and administrators, is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide, The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting, network address translation, and configuring workstations, servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis, wherever possible each chapter was written to be independent, making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing, the end results are not very efficient. And in the quickly changing global business environment, inefficiency wastes your time and money, both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively.

Introduction to Scientific and Technical Computing (Hardcover): Frank T. Willmore, Eric Jankowski, Coray Colina Introduction to Scientific and Technical Computing (Hardcover)
Frank T. Willmore, Eric Jankowski, Coray Colina
R5,637 Discovery Miles 56 370 Ships in 10 - 15 working days

Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula. This book contains chapters summarizing the most important topics that computational researchers need to know about. It leverages the viewpoints of passionate experts involved with scientific computing courses around the globe and aims to be a starting point for new computational scientists and a reference for the experienced. Each contributed chapter focuses on a specific tool or skill, providing the content needed to provide a working knowledge of the topic in about one day. While many individual books on specific computing topics exist, none is explicitly focused on getting technical professionals and students up and running immediately across a variety of computational areas.

CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover)
Boisy G Pitre, Bill Loguidice
R5,764 Discovery Miles 57 640 Ships in 10 - 15 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

Broadband RF and Microwave Amplifiers (Paperback): Andrei Grebennikov, Narendra Kumar, Binboga S Yarman Broadband RF and Microwave Amplifiers (Paperback)
Andrei Grebennikov, Narendra Kumar, Binboga S Yarman
R2,639 Discovery Miles 26 390 Ships in 10 - 15 working days

Broadband RF and Microwave Amplifiers provides extensive coverage of broadband radio frequency (RF) and microwave power amplifier design, including well-known historical and recent novel schematic configurations, theoretical approaches, circuit simulation results, and practical implementation strategies. The text begins by introducing two-port networks to illustrate the behavior of linear and nonlinear circuits, explaining the basic principles of power amplifier design, and discussing impedance matching and broadband power amplifier design using lumped and distributed parameters. The book then: Shows how dissipative or lossy gain-compensation-matching circuits can offer an important trade-off between power gain, reflection coefficient, and operating frequency bandwidth Describes the design of broadband RF and microwave amplifiers using real frequency techniques (RFTs), supplying numerous examples based on the MATLAB (R) programming process Examines Class-E power amplifiers, Doherty amplifiers, low-noise amplifiers, microwave gallium arsenide field-effect transistor (GaAs FET)-distributed amplifiers, and complementary metal-oxide semiconductor (CMOS) amplifiers for ultra-wideband (UWB) applications Broadband RF and Microwave Amplifiers combines theoretical analysis with practical design to create a solid foundation for innovative ideas and circuit design techniques.

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover)
Jesse Varsalone, Matthew McFadden
R5,793 Discovery Miles 57 930 Ships in 10 - 15 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R5,076 Discovery Miles 50 760 Ships in 10 - 15 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

Making Them Move - Mechanics, Control & Animation of Articulated Figures (Hardcover): Norman Badler, Brian Barsky, David Zeltzer Making Them Move - Mechanics, Control & Animation of Articulated Figures (Hardcover)
Norman Badler, Brian Barsky, David Zeltzer
R4,064 Discovery Miles 40 640 Ships in 10 - 15 working days

Current computer graphics hardware and software make it possible to synthesize near photo-realistic images, but the simulation of natural-looking motion of articulated figures remains a difficultand challenging task. Skillfully rendered animation of humans, animals, and robots can delight and move us, but simulating their realistic motion holds great promise for many other applications as well, including ergonomic engineering design, clinical diagnosis of pathological movements, rehabilitation therapy, and biomechanics.Making Them Move presents the work of leading researchers in computer graphics, psychology, robotics and mechanical engineering who were invited to attend the Workshop on the Mechanics, Control and Animation of ArticulatedFigures held at the MIT Media Lab in April 1989. The book explores biological and robotic motor control, as well as state-of-the-art computergraphics techniques for simulating human and animal figures in a natural and physically realistic manner.

Parallel Computing - Methods, Algorithms and Applications (Hardcover): D.J. Evans, C.N. Sutti Parallel Computing - Methods, Algorithms and Applications (Hardcover)
D.J. Evans, C.N. Sutti
R2,729 Discovery Miles 27 290 Ships in 10 - 15 working days

Parallel Computing: Methods, Algorithms and Applications presents a collection of original papers presented at the international meeting on parallel processing, methods, algorithms, and applications at Verona, Italy in September 1989.

VLSI Risc Architecture and Organization (Hardcover): S. B. Furber VLSI Risc Architecture and Organization (Hardcover)
S. B. Furber
R7,906 Discovery Miles 79 060 Ships in 10 - 15 working days

With the expectation that architectural improvements will play a significant role inadvancing processor performance, it is critical for readers to maintain an up-to-date,unified overview of technological advances in this vital research area.Gathering into one place material that had been scattered throughout the literaturemakingit difficult to obtain detailed information on computer designs-this importantbook describes the main architectural and organizational features of modem mini- andmicrocomputers. In addition, it explains the RISC philosophy by supplying historicalbackground information and excellent examples of several commercially available RISCmicroprocessors.Limiting attention to VLSI implementations of RISC processors, VLSI RISCArchitecture and Organization offers insight into design issues that arose indeveloping a RISC system, using the VLSI RISC chip set developed at AcornComputers Limited as an example ... discusses options considered during the designprocess, the basis for the decisions made, and implementation details . . . describescontemporary RISC architecture, comparing and contrasting different designs ... andlooks at future trends in RISC research.Discussing the topic cohesively and comprehensively-from initial study into reducedinstructions sets to the widespread introduction of RISC architectures into mainstreamcomputer products-VLSI RISC Architecture and Organization is aninvaluable reference for electrical, electronics, and computer engineers; computerarchitects and scientists; hardware systems designers; and upper-level undergraduate andgraduate students in computer science and electrical engineering courses.

Information Technology and Organizations - Strategies, Networks, and Integration (Hardcover, New): Brian P. Bloomfield, Rod... Information Technology and Organizations - Strategies, Networks, and Integration (Hardcover, New)
Brian P. Bloomfield, Rod Coombs, David Knights, Dale Littler
R4,741 Discovery Miles 47 410 Ships in 10 - 15 working days

This book is concerned with the ways in which organizations design, build and use information technology systems. In particular it looks at the interaction between these IT-centred activities and the broader management processes within organizations. The authors adopt a critical social science perspective on these issues, and are primarily concerned with advancing theoretical debates on how best to understand the related processes of technological and organizational change. To this end, the book examines and deploys recent work on power/knowledge, actor-network theory and critical organization theory. The result is an account of the nature and significance of information systems in organizations which is an alternative perspective to pragmatic and recipe-based approaches to this topic which dominate much contemporary management literature on IT. This book is intended for academic: Management and social science academics and postgraduate students of IT strategy and organization. Practitioner: Senior managers concerned with IT and strategy issues.

Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020): Felipe Rocha... Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020)
Felipe Rocha da Rosa, Luciano Ost, Ricardo Reis
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book describes the benefits and drawbacks inherent in the use of virtual platforms (VPs) to perform fast and early soft error assessment of multicore systems. The authors show that VPs provide engineers with appropriate means to investigate new and more efficient fault injection and mitigation techniques. Coverage also includes the use of machine learning techniques (e.g., linear regression) to speed-up the soft error evaluation process by pinpointing parameters (e.g., architectural) with the most substantial impact on the software stack dependability. This book provides valuable information and insight through more than 3 million individual scenarios and 2 million simulation-hours. Further, this book explores machine learning techniques usage to navigate large fault injection datasets.

Neuro-Fuzzy Equalizers for Mobile Cellular Channels (Paperback): K.C. Raveendranathan Neuro-Fuzzy Equalizers for Mobile Cellular Channels (Paperback)
K.C. Raveendranathan
R1,834 Discovery Miles 18 340 Ships in 10 - 15 working days

Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details the modeling of a mobile broadband communication channel and designing of a neuro-fuzzy adaptive equalizer for it. This book focuses on the concept of the simulation of wireless channel equalizers using the adaptive-network-based fuzzy inference system (ANFIS). The book highlights a study of currently existing equalizers for wireless channels. It discusses several techniques for channel equalization, including the type-2 fuzzy adaptive filter (type-2 FAF), compensatory neuro-fuzzy filter (CNFF), and radial basis function (RBF) neural network. Neuro-Fuzzy Equalizers for Mobile Cellular Channels starts with a brief introduction to channel equalizers, and the nature of mobile cellular channels with regard to the frequency reuse and the resulting CCI. It considers the many channel models available for mobile cellular channels, establishes the mobile indoor channel as a Rayleigh fading channel, presents the channel equalization problem, and focuses on various equalizers for mobile cellular channels. The book discusses conventional equalizers like LE and DFE using a simple LMS algorithm and transversal equalizers. It also covers channel equalization with neural networks and fuzzy logic, and classifies various equalizers.This being a fairly new branch of study, the book considers in detail the concept of fuzzy logic controllers in noise cancellation problems and provides the fundamental concepts of neuro-fuzzy. The final chapter offers a recap and explores venues for further research. This book also establishes a common mathematical framework of the equalizers using the RBF model and develops a mathematical model for ultra-wide band (UWB) channels using the channel co-variance matrix (CCM). Introduces the novel concept of the application of adaptive-network-based fuzzy inference system (ANFIS) in the design of wireless channel equalizers Provides model ultra-wide band (UWB) channels using channel co-variance matrix Offers a formulation of a unified radial basis function (RBF) framework for ANFIS-based and fuzzy adaptive filter (FAF) Type II, as well as compensatory neuro-fuzzy equalizers Includes extensive use of MATLAB (R) as the simulation tool in all the above cases

Parallel Computers 2 - Architecture, Programming and Algorithms (Hardcover, Revised): R.W. Hockney, C.R. Jesshope Parallel Computers 2 - Architecture, Programming and Algorithms (Hardcover, Revised)
R.W. Hockney, C.R. Jesshope
R4,271 Discovery Miles 42 710 Ships in 10 - 15 working days

Since the publication of the first edition, parallel computing technology has gained considerable momentum. A large proportion of this has come from the improvement in VLSI techniques, offering one to two orders of magnitude more devices than previously possible. A second contributing factor in the fast development of the subject is commercialization. The supercomputer is no longer restricted to a few well-established research institutions and large companies. A new computer breed combining the architectural advantages of the supercomputer with the advance of VLSI technology is now available at very attractive prices. A pioneering device in this development is the transputer, a VLSI processor specifically designed to operate in large concurrent systems.
Parallel Computers 2: Architecture, Programming and Algorithms reflects the shift in emphasis of parallel computing and tracks the development of supercomputers in the years since the first edition was published. It looks at large-scale parallelism as found in transputer ensembles. This extensively rewritten second edition includes major new sections on the transputer and the OCCAM language. The book contains specific information on the various types of machines available, details of computer architecture and technologies, and descriptions of programming languages and algorithms. Aimed at an advanced undergraduate and postgraduate level, this handbook is also useful for research workers, machine designers, and programmers concerned with parallel computers. In addition, it will serve as a guide for potential parallel computer users, especially in disciplines where large amounts of computer time are regularly used.

Energy-Efficient Smart Temperature Sensors in CMOS Technology (Hardcover, 1st ed. 2018): Kamran Souri, Kofi Makinwa Energy-Efficient Smart Temperature Sensors in CMOS Technology (Hardcover, 1st ed. 2018)
Kamran Souri, Kofi Makinwa
R3,851 Discovery Miles 38 510 Ships in 18 - 22 working days

This book describes the design and implementation of energy-efficient smart (digital output) temperature sensors in CMOS technology. To accomplish this, a new readout topology, namely the zoom-ADC, is presented. It combines a coarse SAR-ADC with a fine Sigma-Delta (SD) ADC. The digital result obtained from the coarse ADC is used to set the reference levels of the SD-ADC, thereby zooming its full-scale range into a small region around the input signal. This technique considerably reduces the SD-ADC's full-scale range, and notably relaxes the number of clock cycles needed for a given resolution, as well as the DC-gain and swing of the loop-filter. Both conversion time and power-efficiency can be improved, which results in a substantial improvement in energy-efficiency. Two BJT-based sensor prototypes based on 1st-order and 2nd-order zoom-ADCs are presented. They both achieve inaccuracies of less than +/-0.2 DegreesC over the military temperature range (-55 DegreesC to 125 DegreesC). A prototype capable of sensing temperatures up to 200 DegreesC is also presented. As an alternative to BJTs, sensors based on dynamic threshold MOSTs (DTMOSTs) are also presented. It is shown that DTMOSTs are capable of achieving low inaccuracy (+/-0.4 DegreesC over the military temperature range) as well as sub-1V operation, making them well suited for use in modern CMOS processes.

Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations (Hardcover, 1st ed. 2018):... Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations (Hardcover, 1st ed. 2018)
Hideto Hidaka
R3,999 Discovery Miles 39 990 Ships in 10 - 15 working days

This book provides a comprehensive introduction to embedded flash memory, describing the history, current status, and future projections for technology, circuits, and systems applications. The authors describe current main-stream embedded flash technologies from floating-gate 1Tr, floating-gate with split-gate (1.5Tr), and 1Tr/1.5Tr SONOS flash technologies and their successful creation of various applications. Comparisons of these embedded flash technologies and future projections are also provided. The authors demonstrate a variety of embedded applications for auto-motive, smart-IC cards, and low-power, representing the leading-edge technology developments for eFlash. The discussion also includes insights into future prospects of application-driven non-volatile memory technology in the era of smart advanced automotive system, such as ADAS (Advanced Driver Assistance System) and IoE (Internet of Everything). Trials on technology convergence and future prospects of embedded non-volatile memory in the new memory hierarchy are also described. Introduces the history of embedded flash memory technology for micro-controller products and how embedded flash innovations developed; Includes comprehensive and detailed descriptions of current main-stream embedded flash memory technologies, sub-system designs and applications; Explains why embedded flash memory requirements are different from those of stand-alone flash memory and how to achieve specific goals with technology development and circuit designs; Describes a mature and stable floating-gate 1Tr cell technology imported from stand-alone flash memory products - that then introduces embedded-specific split-gate memory cell technologies based on floating-gate storage structure and charge-trapping SONOS technology and their eFlash sub-system designs; Describes automotive and smart-IC card applications requirements and achievements in advanced eFlash beyond 4 0nm node.

The Calculus of Computation - Decision Procedures with Applications to Verification (Hardcover, 2007 ed.): Aaron R. Bradley,... The Calculus of Computation - Decision Procedures with Applications to Verification (Hardcover, 2007 ed.)
Aaron R. Bradley, Zohar Manna
R2,031 Discovery Miles 20 310 Ships in 18 - 22 working days

Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art decision procedures for arithmetic, data structures, and combination theories. The textbook also presents a logical approach to engineering correct software. Verification exercises are given to develop the reader's facility in specifying and verifying software using logic. The treatment of verification concludes with an introduction to the static analysis of software, an important component of modern verification systems. The final chapter outlines courses of further study.

Reconfigurable and Adaptive Computing - Theory and Applications (Hardcover): Nadia Nedjah, Chao Wang Reconfigurable and Adaptive Computing - Theory and Applications (Hardcover)
Nadia Nedjah, Chao Wang
R6,044 Discovery Miles 60 440 Ships in 10 - 15 working days

Reconfigurable computing techniques and adaptive systems are some of the most promising architectures for microprocessors. Reconfigurable and Adaptive Computing: Theory and Applications explores the latest research activities on hardware architecture for reconfigurable and adaptive computing systems. The first section of the book covers reconfigurable systems. The book presents a software and hardware codesign flow for coarse-grained systems-on-chip, a video watermarking algorithm for the H.264 standard, a solution for regular expressions matching systems, and a novel field programmable gate array (FPGA)-based acceleration solution with MapReduce framework on multiple hardware accelerators. The second section discusses network-on-chip, including an implementation of a multiprocessor system-on-chip platform with shared memory access, end-to-end quality-of-service metrics modeling based on a multi-application environment in network-on-chip, and a 3D ant colony routing (3D-ACR) for network-on-chip with three different 3D topologies. The final section addresses the methodology of system codesign. The book introduces a new software-hardware codesign flow for embedded systems that models both processors and intellectual property cores as services. It also proposes an efficient algorithm for dependent task software-hardware codesign with the greedy partitioning and insert scheduling method (GPISM) by task graph.

Design Recipes for FPGAs - Using Verilog and VHDL (Paperback, 2nd edition): Peter Wilson Design Recipes for FPGAs - Using Verilog and VHDL (Paperback, 2nd edition)
Peter Wilson
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Design Recipes for FPGAs provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, it provides design techniques and templates at all levels, together with functional code, which you can easily match and apply to your application. Written in an informal and easy to grasp style, this invaluable resource goes beyond the principles of FPGAs and hardware description languages to demonstrate how specific designs can be synthesized, simulated and downloaded onto an FPGA. In addition, the book provides advanced techniques to create 'real world' designs that fit the device required and which are fast and reliable to implement.

Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE... Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), Wuhan, China, December 24-25, 2014 (Hardcover)
Yuanzhi Wang
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China. The objective of this conference was to provide a forum for different researchers in different fields, especially Computer Education as well as Information Technology, to exchange their various findings. The papers have been grouped under the following overarching themes: Computer Science, Computer Education, Education and Teaching Reform, and Communication and Intelligent Control.

Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover): Jeffrey S. Vetter Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover)
Jeffrey S. Vetter
R3,364 Discovery Miles 33 640 Ships in 10 - 15 working days

HPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles. This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and: Presents highlights of applications, workloads, and benchmarks Describes hardware architectures, system software, and programming systems Explores storage, visualization, and analytics Examines the data center/facility as well as system statistics Featuring pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.

Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback)
Ilker OEzcelik, Richard Brooks
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
High-Performance Embedded Computing…
Marilyn Wolf Paperback R1,769 Discovery Miles 17 690
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R895 R773 Discovery Miles 7 730
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Thinking Machines - Machine Learning and…
Shigeyuki Takano Paperback R2,011 Discovery Miles 20 110
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,199 Discovery Miles 11 990
Advancements in Instrumentation and…
Srijan Bhattacharya Hardcover R6,138 Discovery Miles 61 380
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald Hardcover R5,315 Discovery Miles 53 150
Creativity in Load-Balance Schemes for…
Alberto Garcia-Robledo, Arturo Diaz Perez, … Hardcover R3,901 Discovery Miles 39 010
Edsger Wybe Dijkstra - His Life, Work…
Krzysztof R. Apt, Tony Hoare Hardcover R2,920 Discovery Miles 29 200

 

Partners