Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
The Future of Numerical Computing Written by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum). The unum encompasses all IEEE floating-point formats as well as fixed-point and exact integer arithmetic. This new number type obtains more accurate answers than floating-point arithmetic yet uses fewer bits in many cases, saving memory, bandwidth, energy, and power. A Complete Revamp of Computer Arithmetic from the Ground Up Richly illustrated in color, this groundbreaking book represents a fundamental change in how to perform calculations automatically. It illustrates how this novel approach can solve problems that have vexed engineers and scientists for decades, including problems that have been historically limited to serial processing. Suitable for Anyone Using Computers for Calculations The book is accessible to anyone who uses computers for technical calculations, with much of the book only requiring high school math. The author makes the mathematics interesting through numerous analogies. He clearly defines jargon and uses color-coded boxes for mathematical formulas, computer code, important descriptions, and exercises.
CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks about Network and Application Security
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u
The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the
In Software Mistakes and Tradeoffs you'll learn from costly mistakes that Tomasz Lelek and Jon Skeet have encountered over their impressive careers. You'll explore real-world scenarios where poor understanding of tradeoffs lead to major problems down the road, to help you make better design decisions. Plus, with a little practice, you'll be able to avoid the pitfalls that trip up even the most experienced developers. Software Mistakes and Tradeoffs teaches you how to make better decisions about designing, planning, and implementing applications. You'll analyse real-world scenarios where the wrong tradeoff decisions were made, and discover what could have been done differently. The book lays out the pros and cons of different approaches and explores evergreen patterns that will always be relevant to software design. Code performance versus simplicity. Delivery speed versus duplication. Flexibility versus maintain ability-everydecision you make in software engineering involves balancing tradeoffs. Often, decisions that look good at the design stage can prove problematic in practice.This book reveals the questions you need to be asking to make the right decisions for your own software tradeoffs.
In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking
Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks. It is a self-contained, comprehensive resource that presents: A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networks-and its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users. This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections-applications, technologies, and security-this material fully covers various location-based applications and the impact they will have on the future.
Rapid energy estimation for energy efficient applications using field-programmable gate arrays (FPGAs) remains a challenging research topic. Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems, where energy efficiency is a key performance metric. Helping overcome these challenges, Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware offers solutions for the development of energy efficient applications using FPGAs. The book integrates various high-level abstractions for describing hardware and software platforms into a single, consistent application development framework, enabling users to construct, simulate, and debug systems. Based on these high-level concepts, it proposes an energy performance modeling technique to capture the energy dissipation behavior of both the reconfigurable hardware platform and the target applications running on it. The authors also present a dynamic programming-based algorithm to optimize the energy performance of an application running on a reconfigurable hardware platform. They then discuss an instruction-level energy estimation technique and a domain-specific modeling technique to provide rapid and fairly accurate energy estimation for hardware-software co-designs using reconfigurable hardware. The text concludes with example designs and illustrative examples that show how the proposed co-synthesis techniques lead to a significant amount of energy reduction. This book explores the advantages of using reconfigurable hardware for application development and looks ahead to future research directions in the field. It outlines the range of aspects and steps that lead to an energy efficient hardware-software application synthesis using FPGAs.
Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style of the text should help electronic design automation (EDA) researchers and tool developers create prototype software tools for system-level exploration, with the goal to ultimately obtain an optimized architectural solution of the memory subsystem.
The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing units and special purpose hardware/massively parallel accelerators. While these technologies have numerous benefits, they also pose substantial performance challenges for developers, including scalability, software tuning, and programming issues. Researchers at the Forefront Reveal Results from Their Own State-of-the-Art Work Edited by some of the top researchers in the field and with contributions from a variety of international experts, Scientific Computing with Multicore and Accelerators focuses on the architectural design and implementation of multicore and manycore processors and accelerators, including graphics processing units (GPUs) and the Sony Toshiba IBM (STI) Cell Broadband Engine (BE) currently used in the Sony PlayStation 3. The book explains how numerical libraries, such as LAPACK, help solve computational science problems; explores the emerging area of hardware-oriented numerics; and presents the design of a fast Fourier transform (FFT) and a parallel list ranking algorithm for the Cell BE. It covers stencil computations, auto-tuning, optimizations of a computational kernel, sequence alignment and homology, and pairwise computations. The book also evaluates the portability of drug design applications to the Cell BE and illustrates how to successfully exploit the computational capabilities of GPUs for scientific applications. It concludes with chapters on dataflow frameworks, the Charm++ programming model, scan algorithms, and a portable intracore communication framework. Explores the New Computational Landscape of Hybrid Processors By offering insight into the process of constructing and effectively using the technology, this volume provides a thorough and practical introduction to the area of hybrid computing. It discusses introductory concepts and simple examples of parallel computing, logical and performance debugging for parallel computing, and advanced topics and issues related to the use and building of many applications.
Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services. From basic concepts and recent research findings to future directions, it gathers the insight of 50 experts from around to present a global perspective on the range of technical topics related to cloud computing and Software as a Service (SaaS). The book also: Reviews real cases and applications of cloud computing Discusses the infrastructure cloud and Infrastructure as a Service (IaaS) Considers data- and compute-intensive environments Examines security and reliability in the cloud Witten in a manner that makes this complex subject easy to understand, this is an ideal one-stop reference for anyone interested in cloud computing. The accessible language and wealth of illustrations also make it suitable for academic and research-oriented settings. The comprehensive coverage supplies you with the understanding of cloud computing technologies and trends in parallel computing needed to establish and maintain effective and efficient computing and software services.
Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.
Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's business environment. This time in the spotlight, while well deserved, has not come without a price. Businesses now insist that LANs deliver vast and ever-increasing quantities of business-critical information and that they do it efficiently, flawlessly, without fail, and most of all, securely. Today's network managers must consistently deliver this level of performance, and must do so while keeping up with ever changing, ever increasing demands without missing a beat. At the same time, today's IT managers must deliver business-critical information systems in an environment that has undergone radical paradigm shifts in such widely varied fields as computer architecture, operating systems, application development, and security.
Current computer graphics hardware and software make it possible to synthesize near photo-realistic images, but the simulation of natural-looking motion of articulated figures remains a difficultand challenging task. Skillfully rendered animation of humans, animals, and robots can delight and move us, but simulating their realistic motion holds great promise for many other applications as well, including ergonomic engineering design, clinical diagnosis of pathological movements, rehabilitation therapy, and biomechanics.Making Them Move presents the work of leading researchers in computer graphics, psychology, robotics and mechanical engineering who were invited to attend the Workshop on the Mechanics, Control and Animation of ArticulatedFigures held at the MIT Media Lab in April 1989. The book explores biological and robotic motor control, as well as state-of-the-art computergraphics techniques for simulating human and animal figures in a natural and physically realistic manner.
Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details the modeling of a mobile broadband communication channel and designing of a neuro-fuzzy adaptive equalizer for it. This book focuses on the concept of the simulation of wireless channel equalizers using the adaptive-network-based fuzzy inference system (ANFIS). The book highlights a study of currently existing equalizers for wireless channels. It discusses several techniques for channel equalization, including the type-2 fuzzy adaptive filter (type-2 FAF), compensatory neuro-fuzzy filter (CNFF), and radial basis function (RBF) neural network. Neuro-Fuzzy Equalizers for Mobile Cellular Channels starts with a brief introduction to channel equalizers, and the nature of mobile cellular channels with regard to the frequency reuse and the resulting CCI. It considers the many channel models available for mobile cellular channels, establishes the mobile indoor channel as a Rayleigh fading channel, presents the channel equalization problem, and focuses on various equalizers for mobile cellular channels. The book discusses conventional equalizers like LE and DFE using a simple LMS algorithm and transversal equalizers. It also covers channel equalization with neural networks and fuzzy logic, and classifies various equalizers.This being a fairly new branch of study, the book considers in detail the concept of fuzzy logic controllers in noise cancellation problems and provides the fundamental concepts of neuro-fuzzy. The final chapter offers a recap and explores venues for further research. This book also establishes a common mathematical framework of the equalizers using the RBF model and develops a mathematical model for ultra-wide band (UWB) channels using the channel co-variance matrix (CCM). Introduces the novel concept of the application of adaptive-network-based fuzzy inference system (ANFIS) in the design of wireless channel equalizers Provides model ultra-wide band (UWB) channels using channel co-variance matrix Offers a formulation of a unified radial basis function (RBF) framework for ANFIS-based and fuzzy adaptive filter (FAF) Type II, as well as compensatory neuro-fuzzy equalizers Includes extensive use of MATLAB (R) as the simulation tool in all the above cases
Dramatic increases in processing power have rapidly scaled on-chip aggregate bandwidths into the Tb/s range. This necessitates a corresponding increase in the amount of data communicated between chips, so as not to limit overall system performance. To meet the increasing demand for interchip communication bandwidth, researchers are investigating the use of high-speed optical interconnect architectures. Unlike their electrical counterparts, optical interconnects offer high bandwidth and negligible frequency-dependent loss, making possible per-channel data rates of more than 10 Gb/s. High-Speed Photonics Interconnects explores some of the groundbreaking technologies and applications that are based on photonics interconnects. From the Evolution of High-Speed I/O Circuits to the Latest in Photonics Interconnects Packaging and Lasers Featuring contributions by experts from academia and industry, the book brings together in one volume cutting-edge research on various aspects of high-speed photonics interconnects. Contributors delve into a wide range of technologies, from the evolution of high-speed input/output (I/O) circuits to recent trends in photonics interconnects packaging. The book discusses the challenges associated with scaling I/O data rates and current design techniques. It also describes the major high-speed components, channel properties, and performance metrics. The book exposes readers to a myriad of applications enabled by photonics interconnects technology. Learn about Optical Interconnect Technologies Suitable for High-Density Integration with CMOS Chips This richly illustrated work details how optical interchip communication links have the potential to fully leverage increased data rates provided through complementary metal-oxide semiconductor (CMOS) technology scaling at suitable power-efficiency levels. Keeping the mathematics to a minimum, it gives engineers, researchers, graduate students, and entrepreneurs a comprehensive overview of the dynamic landscape of high-speed photonics interconnects.
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extensive background and introductory material on dynamic systems stability and neural network approximation; alongside future internet requests for congestion control architectures. Designed to operate under extreme heterogeneous, dynamic, and time-varying network conditions, the developed controllers must also handle network modeling structural uncertainties and uncontrolled traffic flows acting as external perturbations. The book also presents a parallel examination of specific adaptive congestion control, NNRC, using adaptive control and approximation theory, as well as extensions toward cooperation of NNRC with application QoS control. Features: Uses adaptive control techniques for congestion control in packet switching networks Employs a rigorously mathematical approach with lucid writing style Presents simulation experiments illustrating significant operational aspects of the method; including scalability, dynamic behavior, wireless networks, and fairness Applies to networked applications in the music industry, computers, image trading, and virtual groups by techniques such as peer-to-peer, file sharing, and internet telephony Contains working examples to highlight and clarify key attributes of the congestion control algorithms presented Drawing on the recent research efforts of the authors, the book offers numerous tables and figures to increase clarity and summarize the algorithms that implement various NNRC building blocks. Extensive simulations and comparison tests analyze its behavior and measure its performance through monitoring vital network quality metrics. Divided into three parts, the book offers a review of computer networks and congestion control, presents an adaptive congestion control framework as an alternative to optimization methods, and provides appendices related to dynamic systems through universal neural network approximators.
Description All aspects of software development and deployment become painfully slow. The solution is to adopt the microservice architecture. This architecture accelerates software development and enables continuous delivery and deployment of complex software applications. Microservice Patterns teaches enterprise developers and architects how to build applications with the microservice architecture. This book also teaches readers how to refactor a monolithic application to a microservice architecture. Key features * In-depth guide * Practical examples * Step-by-step instructions Audience Readers should be familiar with the basics of enterprise application architecture, design, and implementation. About the technology Microservice architecture accelerates software development and enables continuous delivery and deployment of complex software applications. Author biography Chris Richardson is a developer and architect. He is a Java Champion, a JavaOne rock star and the author of POJOs in Action, which describes how to build enterprise Java applications with frameworks such as Spring and Hibernate. Chris was also the founder of the original CloudFoundry.com, an early Java PaaS for Amazon EC2. Today, he is a recognized thought leader in microservices. Chris is the creator of http://microservices.io , a website describing how to develop and deploy microservices. He provides microservices consulting and training and is working on his third startup http://eventuate.io , an application platform for developing microservices.
This volume contains information about the automatic acquisition of biographic knowledge from encyclopedic texts, Web interaction and the navigation problem in hypertext.
The fourth in the "Inside" series, this volume includes four theses
completed under the editor's direction at the Institute for the
Learning Sciences at Northwestern University. This series bridges
the gap between Schank's books introducing (for a popular audience)
the theories behind his work in artificial intelligence (AI) and
the many articles and books written by Schank and other AI
researchers for their colleagues and students. The series will be
of interest to graduate students in AI and professionals in other
academic fields who seek the retraining necessary to join the AI
effort or to understand it at the professional level. |
You may like...
Research Advances in Intelligent…
Anshul Verma, Pradeepika Verma, …
Hardcover
R3,034
Discovery Miles 30 340
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, …
Hardcover
R2,644
Discovery Miles 26 440
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson
Paperback
R1,421
Discovery Miles 14 210
Cloud Computing in Medical Imaging
Ayman El-Baz, Jasjit S. Suri
Hardcover
R4,280
Discovery Miles 42 800
|