0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (41)
  • R500+ (3,219)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Interactive TV Standards - A Guide to MHP, OCAP, and JavaTV (Hardcover, New): Steven Morris, Anthony Smith-Chaigneau Interactive TV Standards - A Guide to MHP, OCAP, and JavaTV (Hardcover, New)
Steven Morris, Anthony Smith-Chaigneau
R4,051 Discovery Miles 40 510 Ships in 12 - 17 working days

For any digital TV developer or manager, the maze of standards and specifications related to MHP and OCAP is daunting-you have to patch together pieces from several standards to gather all the necessary knowledge you need to compete worldwide. The standards themselves can be confusing, and contain many inconsistencies and missing pieces. Interactive TV Standards provides a guide for actually deploying these technologies for a broadcaster or product and application developer.
Understanding what the APIs do is essential for your job, but understanding how the APIs work and how they relate to each other at a deeper level helps you do it better, faster and easier. Learn how to spot when something that looks like a good solution to a problem really isn't. Understand how the many standards that make up MHP fit together, and implement them effectively and quickly. Two DVB insiders teach you which elements of the standards that are needed for digital TV, highlight those elements that are not needed, and explain the special requirements that MHP places on implementations of these standards.
Once you've mastered the basics, you will learn how to develop products for US, European, and Asian markets--saving time and money. By detailing how a team can develop products for both the OCAP and MHP markets, Interactive TV Standards teaches you how to to leverage your experience with one of these standards into the skills and knowledge needed to work with the critical, related standards.
Does the team developing a receiver have all the knowledge they need to succeed, or have they missed important information in an apparently unrelated standard? Does an application developer really know how towrite a reliable piece of software that runs on any MHP or OCAP receiver? Does the broadcaster understand the business and technical issues well enough to deploy MHP successfully, or will their project fail? Increase your chances of success the first time with Interactive TV Standards.
* A practical, real-world introduction to the technical elements of the OCAP and MHP standards.
* Get everything you need without wading though thousands of pages of standards- many of which don't apply to digital TV!
* Get inside concrete problems that have been found by the authors and other users - issues not generally known outside of the standards committees.

The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Hardcover): Catarina... The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Hardcover)
Catarina Dutilh Novaes
R2,394 Discovery Miles 23 940 Ships in 12 - 17 working days

This comprehensive account of the concept and practices of deduction is the first to bring together perspectives from philosophy, history, psychology and cognitive science, and mathematical practice. Catarina Dutilh Novaes draws on all of these perspectives to argue for an overarching conceptualization of deduction as a dialogical practice: deduction has dialogical roots, and these dialogical roots are still largely present both in theories and in practices of deduction. Dutilh Novaes' account also highlights the deeply human and in fact social nature of deduction, as embedded in actual human practices; as such, it presents a highly innovative account of deduction. The book will be of interest to a wide range of readers, from advanced students to senior scholars, and from philosophers to mathematicians and cognitive scientists.

Linux with Operating System Concepts (Paperback, 2nd edition): Richard Fox Linux with Operating System Concepts (Paperback, 2nd edition)
Richard Fox
R2,628 Discovery Miles 26 280 Ships in 12 - 17 working days

1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.

Space Fighter - The Evolutionary City (Game) (Paperback, English ed.): Batstra Brent, Arie Graafland, Camilo Pinilla, Arthur... Space Fighter - The Evolutionary City (Game) (Paperback, English ed.)
Batstra Brent, Arie Graafland, Camilo Pinilla, Arthur van Bilsen; Edited by Winy Maas
R272 R255 Discovery Miles 2 550 Save R17 (6%) Ships in 12 - 17 working days

The book presents the research by the Action Space! Studio on the Evolutionary City. An ambitious project meant to create a new tool not only for urban planners, but also for people involved inside project management business and people outside that practice. A kind of simulator-educational tool. The journey of discovery began by understanding evolution starting with Darwin, his phenotypes, the realms of biology, sociology, and economics. Pumped by evolution's magic the studio quickly plunged into game theory. These two lines of research synthesized into a set of games modeled on diverse aspects of the city - from the tasks a building developer faces when dealing with land value to the more intangible aspects of a city (i.e. the driving forces of desires in social groups).

How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Hardcover, 2nd edition): Simon... How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Hardcover, 2nd edition)
Simon Bell, Trevor Wood-Harper
R3,997 Discovery Miles 39 970 Ships in 12 - 17 working days

This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.

Post-Silicon Validation and Debug (Hardcover, 1st ed. 2019): Prabhat Mishra, Farimah Farahmandi Post-Silicon Validation and Debug (Hardcover, 1st ed. 2019)
Prabhat Mishra, Farimah Farahmandi
R3,732 Discovery Miles 37 320 Ships in 12 - 17 working days

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts. The readers will get a clear understanding of the existing debug infrastructure and how they can be effectively utilized to verify and debug SoCs.

Secrets of a Cyber Security Architect (Hardcover): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Hardcover)
Brook S. E. Schoenfield
R1,866 Discovery Miles 18 660 Ships in 12 - 17 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Paperback, 2nd edition): Simon... How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Paperback, 2nd edition)
Simon Bell, Trevor Wood-Harper
R1,744 Discovery Miles 17 440 Ships in 12 - 17 working days

This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.

Cloud Foundry (Paperback): Duncan Winn Cloud Foundry (Paperback)
Duncan Winn
R362 R265 Discovery Miles 2 650 Save R97 (27%) Ships in 12 - 17 working days

What exactly is a cloud-native platform? It's certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. This O'Reilly report explains the capabilities of cloud-native platforms and examines the fundamental changes enterprises need to make in process, organization, and culture if they're to take real advantage of this approach. Author Duncan Winn focuses on the open source platform Cloud Foundry, one of the more prominent cloud-native providers. You'll learn how cloud-native applications are designed to be "infrastructure unaware" so they can thrive and move at will in the highly distributed and constantly evolving cloud environment.With this report, you'll explore: Technical driving forces that are rapidly changing the way organizations develop and deliver software today How key concepts underpinning the Cloud Foundry platform leverage each of the technical forces discussed How cloud-native platforms remove the requirement to perform undifferentiated heavy lifting, such as provisioning VMs, middleware, and databases Why cloud-native platforms enable fast feedback loops as you move from agile development to agile deployment Recommended changes and practical considerations for organizations that want to build cloud-native applications.

Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems (Hardcover): K Suganthi, R. Karthik, G... Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems (Hardcover)
K Suganthi, R. Karthik, G Rajesh, Peter Ho Chiung Ching
R3,392 Discovery Miles 33 920 Ships in 12 - 17 working days

This book offers the latest advances and results in the fields of Machine Learning and Deep Learning for Wireless Communication and provides positive and critical discussions on the challenges and prospects. It provides a broad spectrum in understanding the improvements in Machine Learning and Deep Learning that are motivating by the specific constraints posed by wireless networking systems. The book offers an extensive overview on intelligent Wireless Communication systems and its underlying technologies, research challenges, solutions, and case studies. It provides information on intelligent wireless communication systems and its models, algorithms and applications. The book is written as a reference that offers the latest technologies and research results to various industry problems.

Digital Signal Processing for Multimedia Systems (Hardcover): Keshab K. Parhi, Takao Nishitami Digital Signal Processing for Multimedia Systems (Hardcover)
Keshab K. Parhi, Takao Nishitami
R2,582 Discovery Miles 25 820 Ships in 12 - 17 working days

Addresses a wide selection of multimedia applications, programmable and custom architectures for the implementations of multimedia systems, and arithmetic architectures and design methodologies. The book covers recent applications of digital signal processing algorithms in multimedia, presents high-speed and low-priority binary and finite field arithmetic architectures, details VHDL-based implementation approaches, and more.

Advanced Computer Performance Modeling and Simulation (Hardcover): Kallol Bagchi, Jean Walrand, George Zobrist Advanced Computer Performance Modeling and Simulation (Hardcover)
Kallol Bagchi, Jean Walrand, George Zobrist
R3,100 Discovery Miles 31 000 Ships in 12 - 17 working days

Addresses the major issues involved in computer design and architectures. Dealing primarily with theory, tools, and techniques as related to advanced computer systems, it provides tutorials and surveys and relates new important research results. Each chapter provides background information, describes and analyzes important work done in the field, and provides important direction to the reader on future work and further readings. The topics covered include hierarchical design schemes, parallel and distributed modeling and simulation, parallel simulation tools and techniques, theoretical models for formal and performance modeling, and performance evaluation techniques.

Reliable Computer Systems - Design and Evaluation, Third Edition (Hardcover, 3rd edition): Daniel P. Siewiorek, Robert S. Swarz Reliable Computer Systems - Design and Evaluation, Third Edition (Hardcover, 3rd edition)
Daniel P. Siewiorek, Robert S. Swarz
R4,097 Discovery Miles 40 970 Ships in 12 - 17 working days

A comprehensive guide to understanding the standard and most recent advances in the design of reliable computer systems. It is organized into three sections, beginning with an in-depth review of existing reliability techniques and evaluation criteria for both hardware and software. also examined are the models for detecting faults and predicting failures, and the financial considerations which are inherent in the design, purchase, operation, and maintenance of a reliable system.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition)
Bongsik Shin
R1,469 Discovery Miles 14 690 Ships in 12 - 17 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover): Parikshit N. Mahalle, Gitanjali Rahul Shinde,... The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover)
Parikshit N. Mahalle, Gitanjali Rahul Shinde, Nancy Ambritta P., Arvind Vinayak Deshpande
R1,605 Discovery Miles 16 050 Ships in 12 - 17 working days

Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application

Organizational Network Analysis - Auditing Intangible Resources (Paperback): Anna Ujwary-Gil Organizational Network Analysis - Auditing Intangible Resources (Paperback)
Anna Ujwary-Gil
R1,299 Discovery Miles 12 990 Ships in 12 - 17 working days

This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge.

Neural Network Analysis, Architectures and Applications (Hardcover): A. Browne Neural Network Analysis, Architectures and Applications (Hardcover)
A. Browne
R4,294 Discovery Miles 42 940 Ships in 12 - 17 working days

Neural Network Analysis, Architectures and Applications discusses the main areas of neural networks, with each authoritative chapter covering the latest information from different perspectives. Divided into three parts, the book first lays the groundwork for understanding and simplifying networks. It then describes novel architectures and algorithms, including pulse-stream techniques, cellular neural networks, and multiversion neural computing. The book concludes by examining various neural network applications, such as neuron-fuzzy control systems and image compression. This final part of the book also provides a case study involving oil spill detection. This book is invaluable for students and practitioners who have a basic understanding of neural computing yet want to broaden and deepen their knowledge of the field.

Exploiting Linked Data and Knowledge Graphs in Large Organisations (Hardcover, 1st ed. 2017): Jeff Z. Pan, Guido Vetere, Jose... Exploiting Linked Data and Knowledge Graphs in Large Organisations (Hardcover, 1st ed. 2017)
Jeff Z. Pan, Guido Vetere, Jose Manuel Gomez- Perez, Honghan Wu
R4,661 Discovery Miles 46 610 Ships in 12 - 17 working days

This book addresses the topic of exploiting enterprise-linked data with a particular focus on knowledge construction and accessibility within enterprises. It identifies the gaps between the requirements of enterprise knowledge consumption and "standard" data consuming technologies by analysing real-world use cases, and proposes the enterprise knowledge graph to fill such gaps. It provides concrete guidelines for effectively deploying linked-data graphs within and across business organizations. It is divided into three parts, focusing on the key technologies for constructing, understanding and employing knowledge graphs. Part 1 introduces basic background information and technologies, and presents a simple architecture to elucidate the main phases and tasks required during the lifecycle of knowledge graphs. Part 2 focuses on technical aspects; it starts with state-of-the art knowledge-graph construction approaches, and then discusses exploration and exploitation techniques as well as advanced question-answering topics concerning knowledge graphs. Lastly, Part 3 demonstrates examples of successful knowledge graph applications in the media industry, healthcare and cultural heritage, and offers conclusions and future visions.

Microprogrammed State Machine Design (Hardcover, New): Michel A. Lynch Microprogrammed State Machine Design (Hardcover, New)
Michel A. Lynch
R5,531 Discovery Miles 55 310 Ships in 12 - 17 working days

Microprogrammed State Machine Design is a digital computer architecture text that builds systematically from basic concepts to complex state-machine design. It provides practical techniques and alternatives for designing solutions to data processing problems both in commerce and in research purposes. It offers an excellent introduction to the tools and elements of design used in microprogrammed state machines, and incoporates the necessary background in number systems, hardware building blocks, assemblers for use in preparing control programs, and tools and components for assemblers . The author conducts an in-depth examination of first- and second-level microprogrammed state machines. He promotes a top-down approach that examines algorithms mathematically to exploit the simplifications resulting from choosing the proper representation and application of algebraic manipulation. The steps involved in the cycle of design and simulation steps are demonstrated through an example of running a computer through a simulation. Other topics covered in Microprogrammed State Machine Design include a discussion of simulation methods, the development and use of assembler language processors, and comparisons among various hardware implementations, such as the Reduced Instruction Set Computer (RISC) and the Digital Signal Processor (DSP). As a text and guide, Microprogrammed State Machine Design will interest students in the computer sciences, computer architectects and engineers, systems programmers and analysts, and electrical engineers.

Podman in Action (Paperback): Daniel Walsh Podman in Action (Paperback)
Daniel Walsh
R1,370 Discovery Miles 13 700 Ships in 9 - 15 working days

Discover Podman, a next-generation container engine that manages containers rootlessly and provides extra layers of exceptional security unavailable in Docker and other container platforms. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container's lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. about the technology Podman is a daemonless container engine that lets you build and run containers on all Linux distributions, Windows, and MacOS. It supports the fork exec model for running containers, which allows for better integration with a system and makes it easier to run rootless. It also boasts unique advanced features, such as the ability to create and run Pods that are similar to Kubernetes, and execute Kubernetes YAML. And if you're not ready to completely move on from Docker, Podman can run as a service and support the Docker API in a way that works with docker-compose and docker-py. about the reader For developers or system administrators experienced with Linux and the basics of Docker.

Security and Privacy in the Internet of Things (Hardcover): Syed Rameem Zahra, Mohammad Ahsan Chishti Security and Privacy in the Internet of Things (Hardcover)
Syed Rameem Zahra, Mohammad Ahsan Chishti
R3,662 Discovery Miles 36 620 Ships in 12 - 17 working days

This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. * Covers all aspects of security * Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions * Discusses ways for achieving better access control and trust in the IoT ecosystem * Contributes exhaustive strategic plans to deal with security issues of IoT * Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.

Smart SOA Platforms in Cloud Computing Architectures (Hardcover, New): E. Exposito Smart SOA Platforms in Cloud Computing Architectures (Hardcover, New)
E. Exposito
R3,959 Discovery Miles 39 590 Ships in 12 - 17 working days

This book is intended to introduce the principles of the Event-Driven and Service-Oriented Architecture (SOA 2.0) and its role in the new interconnected world based on the cloud computing architecture paradigm. In this new context, the concept of service is widely applied to the hardware and software resources available in the new generation of the Internet. The authors focus on how current and future SOA technologies provide the basis for the smart management of the service model provided by the Platform as a Service (PaaS) layer.

Parallel Computers 2 - Architecture, Programming and Algorithms (Hardcover, Revised): R.W. Hockney, C.R. Jesshope Parallel Computers 2 - Architecture, Programming and Algorithms (Hardcover, Revised)
R.W. Hockney, C.R. Jesshope
R4,055 Discovery Miles 40 550 Ships in 12 - 17 working days

Since the publication of the first edition, parallel computing technology has gained considerable momentum. A large proportion of this has come from the improvement in VLSI techniques, offering one to two orders of magnitude more devices than previously possible. A second contributing factor in the fast development of the subject is commercialization. The supercomputer is no longer restricted to a few well-established research institutions and large companies. A new computer breed combining the architectural advantages of the supercomputer with the advance of VLSI technology is now available at very attractive prices. A pioneering device in this development is the transputer, a VLSI processor specifically designed to operate in large concurrent systems.
Parallel Computers 2: Architecture, Programming and Algorithms reflects the shift in emphasis of parallel computing and tracks the development of supercomputers in the years since the first edition was published. It looks at large-scale parallelism as found in transputer ensembles. This extensively rewritten second edition includes major new sections on the transputer and the OCCAM language. The book contains specific information on the various types of machines available, details of computer architecture and technologies, and descriptions of programming languages and algorithms. Aimed at an advanced undergraduate and postgraduate level, this handbook is also useful for research workers, machine designers, and programmers concerned with parallel computers. In addition, it will serve as a guide for potential parallel computer users, especially in disciplines where large amounts of computer time are regularly used.

IoT Security Paradigms and Applications - Research and Practices (Hardcover): Sudhir Kumar Sharma, Bharat Bhushan, Narayan C... IoT Security Paradigms and Applications - Research and Practices (Hardcover)
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C Debnath
R4,448 Discovery Miles 44 480 Ships in 12 - 17 working days

Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment

Blockchain Technology and Applications (Hardcover): Pethuru Raj, Kavita Saini, Chellammal Surianarayanan Blockchain Technology and Applications (Hardcover)
Pethuru Raj, Kavita Saini, Chellammal Surianarayanan
R2,355 Discovery Miles 23 550 Ships in 12 - 17 working days

Blockchain is emerging as a powerful technology, which has attracted the wider attention of all businesses across the globe. In addition to financial businesses, IT companies and business organizations are keenly analyzing and adapting this technology for improving business processes. Security is the primary enterprise application. There are other crucial applications that include creating decentralized applications and smart contracts, which are being touted as the key differentiator of this pioneering technology. The power of any technology lies in its ecosystem. Product and tool vendors are building and releasing a variety of versatile and robust toolsets and platforms in order to speed up and simplify blockchain application development, deployment and management. There are other infrastructure-related advancements in order to streamline blockchain adoption. Cloud computing, big data analytics, machine and deep learning algorithm, and connected and embedded devices all are driving blockchain application development and deployment. Blockchain Technology and Applications illustrates how blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It examines: Data confidential, integrity, and authentication Distributed consensus protocols and algorithms Blockchain systems design criteria and systems interoperability and scalability Integration with other technologies including cloud and big data It also details how blockchain is being blended with cloud computing, big data analytics and IoT across all industry verticals. The book gives readers insight into how this path-breaking technology can be a value addition in several business domains ranging from healthcare, financial services, government, supply chain and retail.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Empowered or Left Behind - Use of…
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan Hardcover R1,448 Discovery Miles 14 480
Designing Switch/Routers - Fundamental…
James Aweya Hardcover R8,792 Discovery Miles 87 920
Quick Recursion
David Matuszek Paperback R753 Discovery Miles 7 530
Parallel Computing
Moreshwar R. Bhujade Hardcover R1,057 Discovery Miles 10 570
Advances in Mobile Health Technology - A…
Sinjini Mitra Paperback R1,341 Discovery Miles 13 410
Cloud-based Multi-Modal Information…
Srinidhi Hiriyannaiah, Siddesh G.M., … Hardcover R2,730 Discovery Miles 27 300
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,421 Discovery Miles 14 210
Security and Resilience of Cyber…
Krishan Kumar, Sunny Behal, … Hardcover R2,730 Discovery Miles 27 300
Designing Switch/Routers - Fundamental…
James Aweya Paperback R3,696 Discovery Miles 36 960
5G New Radio Non-Orthogonal Multiple…
Yifei Yuan, Zhifeng Yuan Hardcover R3,056 Discovery Miles 30 560

 

Partners