0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (38)
  • R500+ (3,074)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE... Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), Wuhan, China, December 24-25, 2014 (Hardcover)
Yuanzhi Wang
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China. The objective of this conference was to provide a forum for different researchers in different fields, especially Computer Education as well as Information Technology, to exchange their various findings. The papers have been grouped under the following overarching themes: Computer Science, Computer Education, Education and Teaching Reform, and Communication and Intelligent Control.

Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover): Jeffrey S. Vetter Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover)
Jeffrey S. Vetter
R3,364 Discovery Miles 33 640 Ships in 10 - 15 working days

HPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles. This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and: Presents highlights of applications, workloads, and benchmarks Describes hardware architectures, system software, and programming systems Explores storage, visualization, and analytics Examines the data center/facility as well as system statistics Featuring pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition)
Bongsik Shin
R1,200 R1,133 Discovery Miles 11 330 Save R67 (6%) Ships with 15 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective.

Because of the critical importance of cybersecurity in today’s enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading.

This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter.

FEATURES

Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity

Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP

Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice

Explains subjects in a systematic and practical manner to facilitate understanding

Includes practical exercise questions that can be individual or group assignments within or without a classroom

Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning

The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Table of Contents

1. Networking: Fundamental Concepts

2. Cybersecurity: Fundamentals

3. Essential Layers of Computer Networking

4. IP Address Planning and Management

5. Intermediary Devices

6. Wi-Fi and Cellular Network

7. Ethernet LAN

8. Cybersecurity: Threats

9. Cybersecurity: Network and Host Protection

10. Cybersecurity: Data Protection

11. Fundamentals of Packet Routing

12. Wide Area Network

13. Physical Layer Data Transmissions

Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback)
Ilker OEzcelik, Richard Brooks
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Security Patterns in Practice - Designing Secure Architectures Using Software Patterns (Hardcover): E. E. Fernandez Security Patterns in Practice - Designing Secure Architectures Using Software Patterns (Hardcover)
E. E. Fernandez
R1,517 R1,227 Discovery Miles 12 270 Save R290 (19%) Ships in 10 - 15 working days

Learn to combine security theory and code to produce secure systems

Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides an extensive, up-to-date catalog of security patternsShares real-world case studies so you can see when and how to use security patterns in practiceDetails how to incorporate security from the conceptual stage Highlights tips on authentication, authorization, role-based access control, firewalls, wireless networks, middleware, VoIP, web services security, and moreAuthor is well known and highly respected in the field of security and an expert on security patterns

"Security Patterns in Practice" shows you how to confidently develop a secure system step by step.

Theory of Reversible Computing (Hardcover, 1st ed. 2017): Kenichi Morita Theory of Reversible Computing (Hardcover, 1st ed. 2017)
Kenichi Morita
R5,526 Discovery Miles 55 260 Ships in 10 - 15 working days

This book describes reversible computing from the standpoint of the theory of automata and computing. It investigates how reversibility can be effectively utilized in computing. A reversible computing system is a "backward deterministic" system such that every state of the system has at most one predecessor. Although its definition is very simple, it is closely related to physical reversibility, one of the fundamental microscopic laws of Nature. Authored by the leading scientist on the subject, this book serves as a valuable reference work for anyone working in reversible computation or in automata theory in general. This work deals with various reversible computing models at several different levels, which range from the microscopic to the macroscopic, and aims to clarify how computation can be carried out efficiently and elegantly in these reversible computing models. Because the construction methods are often unique and different from those in the traditional methods, these computing models as well as the design methods provide new insights for future computing systems. Organized bottom-up, the book starts with the lowest scale of reversible logic elements and circuits made from them. This is followed by reversible Turing machines, the most basic computationally universal machines, and some other types of reversible automata such as reversible multi-head automata and reversible counter machines. The text concludes with reversible cellular automata for massively parallel spatiotemporal computation. In order to help the reader have a clear understanding of each model, the presentations of all different models follow a similar pattern: the model is given in full detail, a short informal discussion is held on the role of different elements of the model, and an example with illustrations follows each model.

Good Code, Bad Code: Think like a software engineer (Paperback): Tom Long Good Code, Bad Code: Think like a software engineer (Paperback)
Tom Long
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

"Helps explain some of the knowledge gaps between enthusiastic new graduates and grouchy old gray beards like myself." - Joe Ivans Practical techniques for writing code that is robust, reliable, and easy for team members to understand and adapt. Good code or bad code? The difference often comes down to how you apply the conventions, style guides, and other established practices of the software development community. In Good Code, Bad Code you'll learn how to boost your effectiveness and productivity with code development insights normally only learned through years of experience, careful mentorship, and hundreds of code reviews. In Good Code, Bad Code you'll learn how to: - Think about code like an effective software engineer - Write functions that read like a well-structured sentence - Ensure code is reliable and bug free - Effectively unit test code - Identify code that can cause problems and improve it - Write code that is reusable and adaptable to new requirements - Improve your medium and long-term productivity - Save you and your team's time about the technology Coding in a development team requires very different skills to working on personal projects. Successful software engineers need to ensure that their code is reusable, maintainable, and easy for others to understand and adapt. about the book Good Code, Bad Code is a shortcut guide to writing high-quality code. Your mentor is Google veteran Tom Long, who lays out lessons and mindsets that will take your code from "junior developer" to "senior engineer." This instantly-useful book distils the principles of professional coding into one comprehensive and hands-on beginner's guide. You'll start with a jargon-free primer to coding fundamentals that teaches you to think about abstractions, consider your fellow engineers, and write code that can recover from errors. Next, you'll dive into specific techniques and practices. You'll run through common coding practices to learn when to apply the right technique to your problem-and which might be best avoided! All practices are illustrated with annotated code samples written in an instantly recognizable pseudocode that you can relate to your favourite object-oriented language. By the time you're done, you'll be writing the kind of readable, reusable, and testable code that's the mark of a true software professional. about the reader For coders looking to improve their experience in professional software development. about the author Tom Long is a software engineer at Google. He works as a tech lead, mentoring and teaching professional coding practices to new graduates and beginner software engineers.

Efficient Lighting Applications and Case Studies (Hardcover, New): Scott C. Dunning, Albert. Thumann Efficient Lighting Applications and Case Studies (Hardcover, New)
Scott C. Dunning, Albert. Thumann
R3,369 Discovery Miles 33 690 Ships in 10 - 15 working days

With the increased concern for energy conservation in recent years, much attention has been focused on lighting energy consumption and methods for reducing it. Along with this concern for energy efficient lighting has come the realization that lighting has profound effects on worker productivity as well as important aesthetic qualities. This book presents an introduction to lighting design and energy efficiency which can be utilized while maintaining the quality of illumination. Topics include lighting energy management, selection of lamps, task lighting, lighting design, lighting control, reflectors, ballast selection, natural daylighting, wireless lighting control, and case studies.

Identification and Management of Distributed Data - NGN, Content-Centric Networks and the Web (Hardcover): Giovanni Bartolomeo,... Identification and Management of Distributed Data - NGN, Content-Centric Networks and the Web (Hardcover)
Giovanni Bartolomeo, Tatiana Kovacikova
R2,813 Discovery Miles 28 130 Ships in 10 - 15 working days

Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management.
With a focus on the primary problems in identifying, addressing, and managing information in a distributed environment, the book guides you through the discovery of distributed data management on the web, in next-generation networks (NGNs), and in new content-centric networking paradigms. It includes case studies from the Palo Alto Research Center and the Semantic Web Education and Outreach Interest Group that illustrate the convergence between software engineering and networking technologies.
Derived from academic courses, ongoing research, and the latest standardization initiatives, the book explains how the various layers of the existing Internet protocol stack already provide most of the functions that information engineers need to design efficient systems. Although the subject is broad, the book provides helpful insights into a number of critical technologies to provide you with the foundation required to build and deploy more efficient data interoperability paradigms in next-generation networks.

Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Hardcover, 1st ed.... Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Hardcover, 1st ed. 2018)
Basel Halak
R2,795 Discovery Miles 27 950 Ships in 10 - 15 working days

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.

Introduction to Digital Systems Design (Hardcover, 1st ed. 2019): Giuliano Donzellini, Luca Oneto, Domenico Ponta, Davide... Introduction to Digital Systems Design (Hardcover, 1st ed. 2019)
Giuliano Donzellini, Luca Oneto, Domenico Ponta, Davide Anguita
R2,525 Discovery Miles 25 250 Ships in 18 - 22 working days

This book has been designed for a first course on digital design for engineering and computer science students. It offers an extensive introduction on fundamental theories, from Boolean algebra and binary arithmetic to sequential networks and finite state machines, together with the essential tools to design and simulate systems composed of a controller and a datapath. The numerous worked examples and solved exercises allow a better understanding and more effective learning. All of the examples and exercises can be run on the Deeds software, freely available online on a webpage developed and maintained by the authors. Thanks to the learning-by-doing approach and the plentiful examples, no prior knowledge in electronics of programming is required. Moreover, the book can be adapted to different level of education, with different targets and depth, be used for self-study, and even independently from the simulator. The book draws on the authors' extensive experience in teaching and developing learning materials.

Logic Synthesis for FSM-Based Control Units (Hardcover, 2010 ed.): Alexander Barkalov, Larysa Titarenko Logic Synthesis for FSM-Based Control Units (Hardcover, 2010 ed.)
Alexander Barkalov, Larysa Titarenko
R4,145 Discovery Miles 41 450 Ships in 18 - 22 working days

Tremendous achievements in the area of semiconductor electronics turn - croelectronics into nanoelectronics. Actually, we observe a real technical boom connected with achievements in nanoelectronics. It results in devel- mentofverycomplexintegratedcircuits, particularlythe?eldprogrammable logic devices (FPLD). Up-to-day FPLD chips are so huge, that it is enough only one chip to implement a really complex digital system including a da- path and a control unit. Because of the extreme complexity of modern - crochips, it is very important to develop e?ective design methods oriented on particular properties of logic elements. The development of digital s- tems with use of FPLD microchips is not possible without use of di?erent hardware description languages(HDL), such as VHDL and Verilog. Di?erent computer-aided design tools (CAD) are wide used to develop digital system hardware. As majorityof researchespoint out, the design processis nowvery similar to the process of program development. It allows a researcher to pay more attention to some speci?c problems, where there are no standard f- mal methods of their solution. But application of all these achievements does not guaranteeper sedevelopmentof some competitiveelectronic product, - pecially in the acceptable time-to-market. This problem solution is possible only if a researcher possesses fundamental knowledge of a design process and knows exactly the mode of operation of industrial CAD tools in use. As it is known, any digital system can be represented as a composition of a da- path and a control uni

The Architecture of Information - Architecture, Interaction Design and the Patterning of Digital Information (Paperback):... The Architecture of Information - Architecture, Interaction Design and the Patterning of Digital Information (Paperback)
Martyn Dade-Robertson
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This book looks at relationships between the organisation of physical objects in space and the organisation of ideas. Historical, philosophical, psychological and architectural knowledge are united to develop an understanding of the relationship between information and its representation. Despite its potential to break the mould, digital information has relied on metaphors from a pre-digital era. In particular, architectural ideas have pervaded discussions of digital information, from the urbanisation of cyberspace in science fiction, through to the adoption of spatial visualisations in the design of graphical user interfaces. This book tackles: * the historical importance of physical places to the organisation and expression of knowledge * the limitations of using the physical organisation of objects as the basis for systems of categorisation and taxonomy * the emergence of digital technologies and the 20th century new conceptual understandings of knowledge and its organisation * the concept of disconnecting storage of information objects from their presentation and retrieval * ideas surrounding semantic space' * the realities of the types of user interface which now dominate modern computing.

Programming Massively Parallel Processors - A Hands-on Approach (Paperback, 4th edition): Wen-Mei W. Hwu, David B. Kirk, Izzat... Programming Massively Parallel Processors - A Hands-on Approach (Paperback, 4th edition)
Wen-Mei W. Hwu, David B. Kirk, Izzat El Hajj
R1,926 Discovery Miles 19 260 Ships in 10 - 15 working days

Programming Massively Parallel Processors: A Hands-on Approach shows both student and professional alike the basic concepts of parallel programming and GPU architecture. Various techniques for constructing parallel programs are explored in detail. Case studies demonstrate the development process, which begins with computational thinking and ends with effective and efficient parallel programs. Topics of performance, floating-point format, parallel patterns, and dynamic parallelism are covered in depth. For this new edition, the authors are updating their coverage of CUDA, including the concept of unified memory, and expanding content in areas such as threads, while still retaining its concise, intuitive, practical approach based on years of road-testing in the authors' own parallel computing courses.

Optical Communication Systems - Limits and Possibilities (Hardcover): Andrew Ellis, Mariia Sorokina Optical Communication Systems - Limits and Possibilities (Hardcover)
Andrew Ellis, Mariia Sorokina
R3,405 Discovery Miles 34 050 Ships in 10 - 15 working days

Telecommunications have underpinned social interaction and economic activity since the 19th century and have been increasingly reliant on optical fibers since their initial commercial deployment by BT in 1983. Today, mobile phone networks, data centers, and broadband services that facilitate our entertainment, commerce, and increasingly health provision are built on hidden optical fiber networks. However, recently it emerged that the fiber network is beginning to fill up, leading to the talk of a capacity crunch where the capacity still grows but struggles to keep up with the increasing demand. This book, featuring contributions by the suppliers of widely deployed simulation software and academic authors, illustrates the origins of the limited performance of an optical fiber from the engineering, physics, and information theoretic viewpoints. Solutions are then discussed by pioneers in each of the respective fields, with near-term solutions discussed by industrially based authors, and more speculative high-potential solutions discussed by leading academic groups.

ASP.NET Core Razor Pages in Action (Paperback): Mike Brind ASP.NET Core Razor Pages in Action (Paperback)
Mike Brind
R1,350 R1,117 Discovery Miles 11 170 Save R233 (17%) Ships in 5 - 10 working days

Razor Pages lets you build, configure, and deploy amazing dynamic ASP.NET websites with ease. In ASP.NET Core Razor Pages in Action you will learn: Building, configuring, and publishing a data-driven website Creating a complete web application step-by-step Forms for collecting and processing user data Connecting to databases from a Razor Page Protecting areas of a Razor Page from unauthorized access with ASP.NET Identity Using Object Relational Mapping tools to work with data in Razor Pages applications Generating CRUD pages using scaffolding gestures Generating and sending email from your web application ASP.NET Core Razor Pages in Action teaches you to develop dynamic websites using the powerful Razor Pages framework, .NET 6, and ASP.NET. Razor Pages generates HTML on the server, and is the perfect choice for eCommerce sites, intranet services, content management systems, and other apps that require reliability. In this book, you'll use Razor Pages to build a complete application for booking city breaks, learning to iterate amazing new features chapter-by-chapter. about the technology Razor Pages sits on top of .NET 6 as a key part of ASP.NET Core, and has become the recommended tool for any developer building websites with Microsoft technologies. The page-focused framework is great for building dynamic websites that change frequently, and simplifies the process of building complex applications. about the book ASP.NET Core Razor Pages in Action shows you how to use Razor Pages to create dynamic websites that are easy to test and scale. You'll go hands-on to build a complete vacation-booking application, incorporating new framework features and adding complexities as they're introduced. As the application unfolds, you'll see how Razor Pages simplifies all the essential tasks of web development, from form creation and data processing, to easy publication and deployment. You'll also learn to enhance your web applications with the huge ecosystem of C# libraries, and how to locate the perfect tool for your task using centralized repositories.

The Computer Engineering Handbook (Hardcover, 2nd edition): Richard C. Dorf The Computer Engineering Handbook (Hardcover, 2nd edition)
Richard C. Dorf; Edited by Vojin G. Oklobdzija; Contributions by Tomasz Marciniak, Thomas C Savell, Kevin Skadron, …
R6,946 Discovery Miles 69 460 Ships in 10 - 15 working days

After nearly six years as the field's leading reference, the second edition of this award-winning handbook reemerges with completely updated content and a brand new format. The Computer Engineering Handbook, Second Edition is now offered as a set of two carefully focused books that together encompass all aspects of the field. In addition to complete updates throughout the book to reflect the latest issues in low-power design, embedded processors, and new standards, this edition includes a new section on computer memory and storage as well as several new chapters on such topics as semiconductor memory circuits, stream and wireless processors, and nonvolatile memory technologies and applications.

Verifiable Autonomous Systems - Using Rational Agents to Provide Assurance about Decisions Made by Machines (Hardcover): Louise... Verifiable Autonomous Systems - Using Rational Agents to Provide Assurance about Decisions Made by Machines (Hardcover)
Louise A. Dennis, Michael Fisher
R2,042 Discovery Miles 20 420 Ships in 10 - 15 working days

How can we provide guarantees of behaviours for autonomous systems such as driverless cars? This tutorial text, for professionals, researchers and graduate students, explains how autonomous systems, from intelligent robots to driverless cars, can be programmed in ways that make them amenable to formal verification. The authors review specific definitions, applications and the unique future potential of autonomous systems, along with their impact on safer decisions and ethical behaviour. Topics discussed include the use of rational cognitive agent programming from the Beliefs-Desires-Intentions paradigm to control autonomous systems and the role model-checking in verifying the properties of this decision-making component. Several case studies concerning both the verification of autonomous systems and extensions to the framework beyond the model-checking of agent decision-makers are included, along with complete tutorials for the use of the freely-available verifiable cognitive agent toolkit Gwendolen, written in Java.

Hard Real-Time Computing Systems - Predictable Scheduling Algorithms and Applications (Hardcover, 3rd ed. 2011): Giorgio C... Hard Real-Time Computing Systems - Predictable Scheduling Algorithms and Applications (Hardcover, 3rd ed. 2011)
Giorgio C Buttazzo
R3,199 Discovery Miles 31 990 Ships in 18 - 22 working days

This updated edition offers an indispensable exposition on real-time computing, with particular emphasis on predictable scheduling algorithms. It introduces the fundamental concepts of real-time computing, demonstrates the most significant results in the field, and provides the essential methodologies for designing predictable computing systems used to support time-critical control applications. Along with an in-depth guide to the available approaches for the implementation and analysis of real-time applications, this revised edition contains a close examination of recent developments in real-time systems, including limited preemptive scheduling, resource reservation techniques, overload handling algorithms, and adaptive scheduling techniques. This volume serves as a fundamental advanced-level textbook. Each chapter provides basic concepts, which are followed by algorithms, illustrated with concrete examples, figures and tables. Exercises and solutions are provided to enhance self-study, making this an excellent reference for those interested in real-time computing for designing and/or developing predictable control applications.

Green Photonics and Electronics (Hardcover, 1st ed. 2017): Gadi Eisenstein, Dieter Bimberg Green Photonics and Electronics (Hardcover, 1st ed. 2017)
Gadi Eisenstein, Dieter Bimberg
R4,056 Discovery Miles 40 560 Ships in 10 - 15 working days

This books focuses on recent break-throughs in the development of a variety of photonic devices, serving distances ranging from mm to many km, together with their electronic counter-parts, e.g. the drivers for lasers, the amplifiers following the detectors and most important, the relevant advanced VLSI circuits. It explains that as a consequence of the increasing dominance of optical interconnects for high performance workstation clusters and supercomputers their complete design has to be revised. This book thus covers for the first time the whole variety of interdependent subjects contributing to green photonics and electronics, serving communication and energy harvesting. Alternative approaches to generate electric power using organic photovoltaic solar cells, inexpensive and again energy efficient in production are summarized. In 2015, the use of the internet consumed 5-6% of the raw electricity production in developed countries. Power consumption increases rapidly and without some transformational change will use, by the middle of the next decade at the latest, the entire electricity production. This apocalyptic outlook led to a redirection of the focus of data center and HPC developers from just increasing bit rates and capacities to energy efficiency. The high speed interconnects are all based on photonic devices. These must and can be energy efficient but they operate in an electronic environment and therefore have to be considered in a wide scope that also requires low energy electronic devices, sophisticated circuit designs and clever architectures. The development of the next generation of high performance exaFLOP computers suffers from the same problem: Their energy consumption based on present device generations is essentially prohibitive.

Trustworthy Hardware Design: Combinational Logic Locking Techniques (Hardcover, 1st ed. 2020): Muhammad Yasin, Jeyavijayan (JV)... Trustworthy Hardware Design: Combinational Logic Locking Techniques (Hardcover, 1st ed. 2020)
Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book have contributed to this field significantly through numerous fundamental papers.

Interactive TV Standards - A Guide to MHP, OCAP, and JavaTV (Hardcover, New): Steven Morris, Anthony Smith-Chaigneau Interactive TV Standards - A Guide to MHP, OCAP, and JavaTV (Hardcover, New)
Steven Morris, Anthony Smith-Chaigneau
R4,549 Discovery Miles 45 490 Ships in 10 - 15 working days

For any digital TV developer or manager, the maze of standards and specifications related to MHP and OCAP is daunting-you have to patch together pieces from several standards to gather all the necessary knowledge you need to compete worldwide. The standards themselves can be confusing, and contain many inconsistencies and missing pieces. Interactive TV Standards provides a guide for actually deploying these technologies for a broadcaster or product and application developer.
Understanding what the APIs do is essential for your job, but understanding how the APIs work and how they relate to each other at a deeper level helps you do it better, faster and easier. Learn how to spot when something that looks like a good solution to a problem really isn't. Understand how the many standards that make up MHP fit together, and implement them effectively and quickly. Two DVB insiders teach you which elements of the standards that are needed for digital TV, highlight those elements that are not needed, and explain the special requirements that MHP places on implementations of these standards.
Once you've mastered the basics, you will learn how to develop products for US, European, and Asian markets--saving time and money. By detailing how a team can develop products for both the OCAP and MHP markets, Interactive TV Standards teaches you how to to leverage your experience with one of these standards into the skills and knowledge needed to work with the critical, related standards.
Does the team developing a receiver have all the knowledge they need to succeed, or have they missed important information in an apparently unrelated standard? Does an application developer really know how towrite a reliable piece of software that runs on any MHP or OCAP receiver? Does the broadcaster understand the business and technical issues well enough to deploy MHP successfully, or will their project fail? Increase your chances of success the first time with Interactive TV Standards.
* A practical, real-world introduction to the technical elements of the OCAP and MHP standards.
* Get everything you need without wading though thousands of pages of standards- many of which don't apply to digital TV!
* Get inside concrete problems that have been found by the authors and other users - issues not generally known outside of the standards committees.

R in Action (Paperback): Robert Kabacoff R in Action (Paperback)
Robert Kabacoff
R1,533 Discovery Miles 15 330 Ships in 10 - 15 working days

Built specifically for statistical computing and graphics, the R language, along with its amazing collection of libraries and tools, is one of the most powerful tools you can use to tackle data analysis for business, research, and other data-intensive domains. This revised and expanded third edition of R in Action covers the new tidy verse approach to data analysis and R's state-of-the-art graphing capabilities with the ggplot2 package. R in Action, Third Edition teaches you to use the R language, including the popular tidy verse packages, through hands-on examples relevant to scientific, technical, and business developers. Focusing on practical solutions to real-world data challenges, R expert RobKabacoff takes you on a crash course in statistics, from dealing with messy and incomplete data to creating stunning visualisations. The R language is the most powerful platform you can choose for modern data analysis. Free and open source, R's community has created thousands of modules to tackle challenges from data-crunching to presentation. R's graphical capabilities are also state-of-the-art, with a comprehensive and powerful feature set available for data visualization. R runs on all major operating systems and is used by businesses, researchers, and organizations worldwide.

How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Hardcover, 2nd edition): Simon... How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Hardcover, 2nd edition)
Simon Bell, Trevor Wood-Harper
R4,358 Discovery Miles 43 580 Ships in 10 - 15 working days

This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.

How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Paperback, 2nd edition): Simon... How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Paperback, 2nd edition)
Simon Bell, Trevor Wood-Harper
R1,865 Discovery Miles 18 650 Ships in 10 - 15 working days

This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Last Men Out - The True Story of…
Bob Drury, Tom Clavin Paperback R441 R414 Discovery Miles 4 140
Memories of a Vietnam Veteran - What I…
Barbara Child Hardcover R795 Discovery Miles 7 950
Vietnam - An Epic History Of A Tragic…
Max Hastings Paperback  (2)
R380 R339 Discovery Miles 3 390
Introduction to Arakelov Theory
Serge Lang Hardcover R2,984 Discovery Miles 29 840
Geometric and Harmonic Analysis on…
Ali Baklouti, Takaaki Nomura Hardcover R2,671 Discovery Miles 26 710
Algebraic Geometry I - Algebraic Curves…
V.I. Danilov Hardcover R4,860 Discovery Miles 48 600
Combinatorial Algebraic Geometry…
Gregory G. Smith, Bernd Sturmfels Hardcover R4,154 Discovery Miles 41 540
A Rock in the Clouds - A Life Revisited
Us Army (Ret ) Col Joseph Tedeschi Hardcover R605 Discovery Miles 6 050
New Trends in Intuitive Geometry
Gergely Ambrus, Imre Barany, … Hardcover R3,181 Discovery Miles 31 810
K3 Surfaces and Their Moduli
Carel Faber, Gavril Farkas, … Hardcover R4,167 Discovery Miles 41 670

 

Partners