0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (41)
  • R500+ (3,207)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Blockchain Technology and Applications (Hardcover): Pethuru Raj, Kavita Saini, Chellammal Surianarayanan Blockchain Technology and Applications (Hardcover)
Pethuru Raj, Kavita Saini, Chellammal Surianarayanan
R2,355 Discovery Miles 23 550 Ships in 12 - 17 working days

Blockchain is emerging as a powerful technology, which has attracted the wider attention of all businesses across the globe. In addition to financial businesses, IT companies and business organizations are keenly analyzing and adapting this technology for improving business processes. Security is the primary enterprise application. There are other crucial applications that include creating decentralized applications and smart contracts, which are being touted as the key differentiator of this pioneering technology. The power of any technology lies in its ecosystem. Product and tool vendors are building and releasing a variety of versatile and robust toolsets and platforms in order to speed up and simplify blockchain application development, deployment and management. There are other infrastructure-related advancements in order to streamline blockchain adoption. Cloud computing, big data analytics, machine and deep learning algorithm, and connected and embedded devices all are driving blockchain application development and deployment. Blockchain Technology and Applications illustrates how blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It examines: Data confidential, integrity, and authentication Distributed consensus protocols and algorithms Blockchain systems design criteria and systems interoperability and scalability Integration with other technologies including cloud and big data It also details how blockchain is being blended with cloud computing, big data analytics and IoT across all industry verticals. The book gives readers insight into how this path-breaking technology can be a value addition in several business domains ranging from healthcare, financial services, government, supply chain and retail.

3D Printing and Intellectual Property (Hardcover): Lucas S. Osborn 3D Printing and Intellectual Property (Hardcover)
Lucas S. Osborn
R2,502 Discovery Miles 25 020 Ships in 12 - 17 working days

Intellectual property (IP) laws were drafted for tangible objects, but 3D printing technology, which digitizes objects and offers manufacturing capacity to anyone, is disrupting these laws and their underlying policies. In this timely work, Lucas S. Osborn focuses on the novel issues raised for IP law by 3D printing for the major IP systems around the world. He specifically addresses how patent and design law must wrestle with protecting digital versions of inventions and policing individualized manufacturing, how trademark law must confront the dissociation of design from manufacturing, and how patent and copyright law must be reconciled when digital versions of primarily utilitarian objects are concerned. With an even hand and keen insight, Osborn offers an innovation-centered analysis of and balanced response to the disruption caused by 3D printing that should be read by nonexperts and experts alike.

Internet of Things (IoT) - Technologies, Applications, Challenges and Solutions (Paperback): B. K. Tripathy, J Anuradha Internet of Things (IoT) - Technologies, Applications, Challenges and Solutions (Paperback)
B. K. Tripathy, J Anuradha
R1,758 Discovery Miles 17 580 Ships in 12 - 17 working days

The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points: * Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture. * Discusses recent security and privacy studies and social behavior of human beings over IoT. * Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges. * Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation. * Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security.

Essentials of Computer Architecture (Hardcover, 2nd edition): Douglas Comer Essentials of Computer Architecture (Hardcover, 2nd edition)
Douglas Comer
R2,688 Discovery Miles 26 880 Ships in 12 - 17 working days

This easy to read textbook provides an introduction to computer architecture, while focusing on the essential aspects of hardware that programmers need to know. The topics are explained from a programmer's point of view, and the text emphasizes consequences for programmers. Divided in five parts, the book covers the basics of digital logic, gates, and data paths, as well as the three primary aspects of architecture: processors, memories, and I/O systems. The book also covers advanced topics of parallelism, pipelining, power and energy, and performance. A hands-on lab is also included. The second edition contains three new chapters as well as changes and updates throughout.

A Comprehensive Study of SQL - Practice and Implementation (Hardcover): Jagdish Chandra Patni A Comprehensive Study of SQL - Practice and Implementation (Hardcover)
Jagdish Chandra Patni
R2,171 Discovery Miles 21 710 Ships in 12 - 17 working days

A Comprehensive Study of SQL - Practice and Implementation is designed as a textbook and provides a comprehensive approach to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. It demonstrates how to leverage the two most vital tools for data query and analysis - SQL and Excel - to perform comprehensive data analysis without the need for a sophisticated and expensive data mining tool or application. Features The book provides a complete collection of modeling techniques, beginning with fundamentals and gradually progressing through increasingly complex real-world case studies It explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications It also gives a solid foundation in best practices and relational theory The book offers self-contained lessons on key SQL concepts or techniques at the end of each chapter using numerous illustrations and annotated examples This book is aimed primarily at advanced undergraduates and graduates with a background in computer science and information technology. Researchers and professionals will also find this book useful.

IoT - Security and Privacy Paradigm (Hardcover): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Hardcover)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R4,752 Discovery Miles 47 520 Ships in 12 - 17 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Microarchitecture of Network-on-Chip Routers - A Designer's Perspective (Hardcover, 2015 ed.): Giorgos Dimitrakopoulos,... Microarchitecture of Network-on-Chip Routers - A Designer's Perspective (Hardcover, 2015 ed.)
Giorgos Dimitrakopoulos, Anastasios Psarras, Ioannis Seitanidis
R3,875 R3,471 Discovery Miles 34 710 Save R404 (10%) Ships in 12 - 17 working days

This book provides a unified overview of network-on-chip router micro-architecture, the corresponding design opportunities and challenges, and existing solutions to overcome these challenges. The discussion focuses on the heart of a NoC, the NoC router, and how it interacts with the rest of the system. Coverage includes both basic and advanced design techniques that cover the entire router design space including router organization, flow control, pipelined operation, buffering architectures, as well as allocators' structure and algorithms. Router micro-architectural options are presented in a step-by-step manner beginning from the basic design principles. Even highly sophisticated design alternatives are categorized and broken down to simpler pieces that can be understood easily and analyzed. This book is an invaluable reference for system, architecture, circuit, and EDA researchers and developers, who are interested in understanding the overall picture of NoC routers' architecture, the associated design challenges, and the available solutions.

Bio-Inspired Fault-Tolerant Algorithms for Network-on-Chip (Hardcover): Muhammad Athar Javed Sethi Bio-Inspired Fault-Tolerant Algorithms for Network-on-Chip (Hardcover)
Muhammad Athar Javed Sethi
R3,693 Discovery Miles 36 930 Ships in 12 - 17 working days

Network on Chip (NoC) addresses the communication requirement of different nodes on System on Chip. The bio-inspired algorithms improve the bandwidth utilization, maximize the throughput and reduce the end-to-end latency and inter-flit arrival time. This book exclusively presents in-depth information regarding bio-inspired algorithms solving real world problems focussing on fault-tolerant algorithms inspired by the biological brain and implemented on NoC. It further documents the bio-inspired algorithms in general and more specifically, in the design of NoC. It gives an exhaustive review and analysis of the NoC architectures developed during the last decade according to various parameters. Key Features: Covers bio-inspired solutions pertaining to Network-on-Chip (NoC) design solving real world examples Includes bio-inspired NoC fault-tolerant algorithms with detail coding examples Lists fault-tolerant algorithms with detailed examples Reviews basic concepts of NoC Discusses NoC architectures developed-to-date

Parallel Computing Architectures and APIs - IoT Big Data Stream Processing (Hardcover): Vivek Kale Parallel Computing Architectures and APIs - IoT Big Data Stream Processing (Hardcover)
Vivek Kale
R4,616 Discovery Miles 46 160 Ships in 12 - 17 working days

Parallel Computing Architectures and APIs: IoT Big Data Stream Processing commences from the point high-performance uniprocessors were becoming increasingly complex, expensive, and power-hungry. A basic trade-off exists between the use of one or a small number of such complex processors, at one extreme, and a moderate to very large number of simpler processors, at the other. When combined with a high-bandwidth, interprocessor communication facility leads to significant simplification of the design process. However, two major roadblocks prevent the widespread adoption of such moderately to massively parallel architectures: the interprocessor communication bottleneck, and the difficulty and high cost of algorithm/software development. One of the most important reasons for studying parallel computing architectures is to learn how to extract the best performance from parallel systems. Specifically, you must understand its architectures so that you will be able to exploit those architectures during programming via the standardized APIs. This book would be useful for analysts, designers and developers of high-throughput computing systems essential for big data stream processing emanating from IoT-driven cyber-physical systems (CPS). This pragmatic book: Devolves uniprocessors in terms of a ladder of abstractions to ascertain (say) performance characteristics at a particular level of abstraction Explains limitations of uniprocessor high performance because of Moore's Law Introduces basics of processors, networks and distributed systems Explains characteristics of parallel systems, parallel computing models and parallel algorithms Explains the three primary categorical representatives of parallel computing architectures, namely, shared memory, message passing and stream processing Introduces the three primary categorical representatives of parallel programming APIs, namely, OpenMP, MPI and CUDA Provides an overview of Internet of Things (IoT), wireless sensor networks (WSN), sensor data processing, Big Data and stream processing Provides introduction to 5G communications, Edge and Fog computing Parallel Computing Architectures and APIs: IoT Big Data Stream Processing discusses stream processing that enables the gathering, processing and analysis of high-volume, heterogeneous, continuous Internet of Things (IoT) big data streams, to extract insights and actionable results in real time. Application domains requiring data stream management include military, homeland security, sensor networks, financial applications, network management, web site performance tracking, real-time credit card fraud detection, etc.

The Virtual and the Real in Planning and Urban Design - Perspectives, Practices and Applications (Paperback): Claudia Yamu,... The Virtual and the Real in Planning and Urban Design - Perspectives, Practices and Applications (Paperback)
Claudia Yamu, Alenka Poplin, Oswald Devisch, Gert De Roo
R1,410 Discovery Miles 14 100 Ships in 12 - 17 working days

The Virtual and the Real in Planning and Urban Design: Perspectives, Practices and Applicationsexplores the merging relationship between physical and virtual spaces in planning and urban design. Technological advances such as smart sensors, interactive screens, locative media and evolving computation software have impacted the ways in which people experience, explore, interact with and create these complex spaces. This book draws together a broad range of interdisciplinary researchers in areas such as architecture, urban design, spatial planning, geoinformation science, computer science and psychology to introduce the theories, models, opportunities and uncertainties involved in the interplay between virtual and physical spaces. Using a wide range of international contributors, from the UK, USA, Germany, France, Switzerland, Netherlands and Japan, it provides a framework for assessing how new technology alters our perception of physical space.

Goedel '96 - Logical Foundations of Mathematics, Computer Science and Physics - Kurt Goedel's Legacy (Hardcover):... Goedel '96 - Logical Foundations of Mathematics, Computer Science and Physics - Kurt Goedel's Legacy (Hardcover)
Petr Hajek
R3,146 Discovery Miles 31 460 Ships in 12 - 17 working days

Since their inception, the Perspectives in Logic and Lecture Notes in Logic series have published seminal works by leading logicians. Many of the original books in the series have been unavailable for years, but they are now in print once again. This volume, the sixth publication in the Lecture Notes in Logic series, collects the proceedings of the conference 'Logical Foundations of Mathematics, Computer Science, and Physics - Kurt Goedel's Legacy', held in Brno, Czech Republic, on the 90th anniversary of Goedel's birth. The broad range of speakers who participated in this event affirms the continuing importance of Goedel's work in logic, physics, and the philosophy and foundations of mathematics and computer science. The papers in this volume range over all these topics and contribute to our present understanding of them.

Contemporary High Performance Computing - From Petascale toward Exascale, Volume 3 (Hardcover): Jeffrey S. Vetter Contemporary High Performance Computing - From Petascale toward Exascale, Volume 3 (Hardcover)
Jeffrey S. Vetter
R3,999 Discovery Miles 39 990 Ships in 12 - 17 working days

Contemporary High Performance Computing: From Petascale toward Exascale, Volume 3 focuses on the ecosystems surrounding the world's leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. This third volume will be a continuation of the two previous volumes, and will include other HPC ecosystems using the same chapter outline: description of a flagship system, major application workloads, facilities, and sponsors. Features: Describes many prominent, international systems in HPC from 2015 through 2017 including each system's hardware and software architecture Covers facilities for each system including power and cooling Presents application workloads for each site Discusses historic and projected trends in technology and applications Includes contributions from leading experts Designed for researchers and students in high performance computing, computational science, and related areas, this book provides a valuable guide to the state-of-the art research, trends, and resources in the world of HPC.

Business Process Reengineering - An ICT Approach (Hardcover): Heru Susanto, Fang-Yie Leu, Chin Kang Chen Business Process Reengineering - An ICT Approach (Hardcover)
Heru Susanto, Fang-Yie Leu, Chin Kang Chen
R3,811 Discovery Miles 38 110 Ships in 12 - 17 working days

This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.

Enterprise Architecture Made Simple - Using the Ready, Set, Go Approach to Achieving Information Centricity (Paperback): Hakan... Enterprise Architecture Made Simple - Using the Ready, Set, Go Approach to Achieving Information Centricity (Paperback)
Hakan Edvinsson, Lottie Aderinne
R1,008 R804 Discovery Miles 8 040 Save R204 (20%) Ships in 10 - 15 working days

Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.

Computer Architectures - Constructing the Common Ground (Hardcover): Theodora Vardouli, Olga Touloumi Computer Architectures - Constructing the Common Ground (Hardcover)
Theodora Vardouli, Olga Touloumi
R4,146 Discovery Miles 41 460 Ships in 12 - 17 working days

Computer Architectures is a collection of multidisciplinary historical works unearthing sites, concepts, and concerns that catalyzed the cross-contamination of computers and architecture in the mid-20th century. Weaving together intellectual, social, cultural, and material histories, this book paints the landscape that brought computing into the imagination, production, and management of the built environment, whilst foregrounding the impact of architecture in shaping technological development. The book is organized into sections corresponding to the classic von Neumann diagram for computer architecture: program (control unit), storage (memory), input/output and computation (arithmetic/logic unit), each acting as a quasi-material category for parsing debates among architects, engineers, mathematicians, and technologists. Collectively, authors bring forth the striking homologies between a computer program and an architectural program, a wall and an interface, computer memory and storage architectures, structures of mathematics and structures of things. The collection initiates new histories of knowledge and technology production that turn an eye toward disciplinary fusions and their institutional and intellectual drives. Constructing the common ground between design and computing, this collection addresses audiences working at the nexus of design, technology, and society, including historians and practitioners of design and architecture, science and technology scholars, and media studies scholars.

The Virtual and the Real in Planning and Urban Design - Perspectives, Practices and Applications (Hardcover): Claudia Yamu,... The Virtual and the Real in Planning and Urban Design - Perspectives, Practices and Applications (Hardcover)
Claudia Yamu, Alenka Poplin, Oswald Devisch, Gert De Roo
R4,156 Discovery Miles 41 560 Ships in 12 - 17 working days

The Virtual and the Real in Planning and Urban Design: Perspectives, Practices and Applicationsexplores the merging relationship between physical and virtual spaces in planning and urban design. Technological advances such as smart sensors, interactive screens, locative media and evolving computation software have impacted the ways in which people experience, explore, interact with and create these complex spaces. This book draws together a broad range of interdisciplinary researchers in areas such as architecture, urban design, spatial planning, geoinformation science, computer science and psychology to introduce the theories, models, opportunities and uncertainties involved in the interplay between virtual and physical spaces. Using a wide range of international contributors, from the UK, USA, Germany, France, Switzerland, Netherlands and Japan, it provides a framework for assessing how new technology alters our perception of physical space.

Low Power Semiconductor Devices and Processes for Emerging Applications in Communications, Computing, and Sensing (Hardcover):... Low Power Semiconductor Devices and Processes for Emerging Applications in Communications, Computing, and Sensing (Hardcover)
Sumeet Walia; Series edited by Krzysztof Iniewski
R4,012 Discovery Miles 40 120 Ships in 12 - 17 working days

The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies. It explores revolutionary device concepts, sensors, and associated circuits and architectures that will greatly extend the practical engineering limits of energy-efficient computation. The book responds to the need to develop disruptive new system architectures and semiconductor processes aimed at achieving the highest level of computational energy efficiency for general purpose computing systems. Discusses unique technologies and material only available in specialized journal and conferences. Covers emerging materials and device structures, such as ultra-low power technologies, nanoelectronics, and microsystem manufacturing. Explores semiconductor processing and manufacturing, device design, and performance. Contains practical applications in the engineering field, as well as graduate studies. Written by international experts from both academia and industry.

Mobile Communications Handbook (Paperback, 3rd edition): Jerry D. Gibson Mobile Communications Handbook (Paperback, 3rd edition)
Jerry D. Gibson
R2,483 Discovery Miles 24 830 Ships in 12 - 17 working days

With 26 entirely new and 5 extensively revised chapters out of the total of 39, the Mobile Communications Handbook, Third Edition presents an in-depth and up-to-date overview of the full range of wireless and mobile technologies that we rely on every day. This includes, but is not limited to, everything from digital cellular mobile radio and evolving personal communication systems to wireless data and wireless networks Illustrating the extraordinary evolution of wireless communications and networks in the last 15 years, this book is divided into five sections: Basic Principles provides the essential underpinnings for the wide-ranging mobile communication technologies currently in use throughout the world. Wireless Standards contains technical details of the standards we use every day, as well as insights into their development. Source Compression and Quality Assessment covers the compression techniques used to represent voice and video for transmission over mobile communications systems as well as how the delivered voice and video quality are assessed. Wireless Networks examines the wide range of current and developing wireless networks and wireless methodologies. Emerging Applications explores newly developed areas of vehicular communications and 60 GHz wireless communications. Written by experts from industry and academia, this book provides a succinct overview of each topic, quickly bringing the reader up to date, but with sufficient detail and references to enable deeper investigations. Providing much more than a "just the facts" presentation, contributors use their experience in the field to provide insights into how each topic has emerged and to point toward forthcoming developments in mobile communications.

The Physics of Computing (Paperback): Marilyn Wolf The Physics of Computing (Paperback)
Marilyn Wolf
R1,842 R1,720 Discovery Miles 17 200 Save R122 (7%) Ships in 12 - 17 working days

The Physics of Computing gives a foundational view of the physical principles underlying computers. Performance, power, thermal behavior, and reliability are all harder and harder to achieve as transistors shrink to nanometer scales. This book describes the physics of computing at all levels of abstraction from single gates to complete computer systems. It can be used as a course for juniors or seniors in computer engineering and electrical engineering, and can also be used to teach students in other scientific disciplines important concepts in computing. For electrical engineering, the book provides the fundamentals of computing that link core concepts to computing. For computer science, it provides foundations of key challenges such as power consumption, performance, and thermal. The book can also be used as a technical reference by professionals.

IoT Automation - Arrowhead Framework (Hardcover): Jerker Delsing IoT Automation - Arrowhead Framework (Hardcover)
Jerker Delsing
R4,168 Discovery Miles 41 680 Ships in 12 - 17 working days

This book presents an in-depth description of the Arrowhead Framework and how it fosters interoperability between IoT devices at service level, specifically addressing application. The Arrowhead Framework utilizes SOA technology and the concepts of local clouds to provide required automation capabilities such as: real time control, security, scalability, and engineering simplicity. Arrowhead Framework supports the realization of collaborative automation; it is the only IoT Framework that addresses global interoperability across multiplet SOA technologies. With these features, the Arrowhead Framework enables the design, engineering, and operation of large automation systems for a wide range of applications utilizing IoT and CPS technologies. The book provides application examples from a wide number of industrial fields e.g. airline maintenance, mining maintenance, smart production, electro-mobility, automative test, smart cities-all in response to EU societal challenges. Features Covers the design and implementation of IoT based automation systems. Industrial usage of Internet of Things and Cyber Physical Systems made feasible through Arrowhead Framework. Functions as a design cookbook for building automation systems using IoT/CPS and Arrowhead Framework. Tools, templates, code etc. described in the book will be accessible through open sources project Arrowhead Framework Wiki at forge.soa4d.org/ Written by the leading experts in the European Union and around the globe.

Ad Hoc Mobile Wireless Networks - Principles, Protocols, and Applications, Second Edition (Paperback, 2nd edition): Subir Kumar... Ad Hoc Mobile Wireless Networks - Principles, Protocols, and Applications, Second Edition (Paperback, 2nd edition)
Subir Kumar Sarkar, T. G. Basavaraju, C. Puttamadappa
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of service and energy management systems. Additional chapters cover mobility models for multi-hop ad hoc wireless networks as well as cross-layer design issues. Exploring Bluetooth, IrDA (Infrared Data Association), HomeRF, WiFi, WiMax, Wireless Internet, and Mobile IP, the book contains appropriate examples and problems at the end of each chapter to illustrate each concept. This second edition has been completely updated with the latest technology and includes a new chapter on recent developments in the field, including sensor networks, personal area networks (PANs), smart dress, and vehicular ad hoc networks. Self-organized, self-configured, and self-controlled, ad hoc mobile wireless networks will continue to be valued for a range of applications, as they can be set up and deployed anywhere and anytime. This volume captures the current state of the field as well as upcoming challenges awaiting researchers.

Software Architecture 2 (Hardcover): MC Oussalah Software Architecture 2 (Hardcover)
MC Oussalah
R3,965 Discovery Miles 39 650 Ships in 12 - 17 working days

Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.

Security without Obscurity - A Guide to PKI Operations (Paperback): Jeff Stapleton, W. Clay Epstein Security without Obscurity - A Guide to PKI Operations (Paperback)
Jeff Stapleton, W. Clay Epstein
R1,364 Discovery Miles 13 640 Ships in 9 - 15 working days

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming. Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices. The highlighted bad practices, based on real-world scenarios from the authors' experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved. This book offers readers the opportunity to benefit from the authors' more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Hardcover):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Hardcover)
Aakanksha Tewari, Brij B. Gupta
R1,761 Discovery Miles 17 610 Ships in 9 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Advanced Design and Implementation of Virtual Machines (Hardcover): Xiao-Feng Li Advanced Design and Implementation of Virtual Machines (Hardcover)
Xiao-Feng Li
R3,281 Discovery Miles 32 810 Ships in 12 - 17 working days

Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java virtual machine, JavaScript engine and Android execution engine. The community expects to see not only formal algorithm description, but also pragmatic code snippets; to understand not only research topics, but also engineering solutions. This book meets these demands by providing a unique description that combines high level design with low level implementations and academic advanced topics with commercial solutions. This book takes a holistic approach to the design of VM architecture, with contents organized into a consistent framework, introducing topics and algorithms in an easily understood step by step process. It focuses on the critical aspects of VM design, which are often overlooked in other works, such as runtime helpers, stack unwinding and native interface. The algorithms are fully illustrated in figures and implemented in easy to digest code snippets, making the abstract concepts tangible and programmable for system software developers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Asynchronous On-Chip Networks and…
Wei Song, Guangda Zhang Hardcover R2,401 Discovery Miles 24 010
Understanding Computers - Today and…
Charles Parker, Deborah Morley Paperback R1,294 R1,162 Discovery Miles 11 620
Artificial Intelligence Perspective for…
Sezer Bozkus Kahyaoglu, Vahap Tecim Hardcover R3,049 Discovery Miles 30 490
Understanding Users - Designing…
Andrew Dillon Paperback R972 Discovery Miles 9 720
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, … Hardcover R2,644 Discovery Miles 26 440
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,421 Discovery Miles 14 210
Parallel Computing
Moreshwar R. Bhujade Hardcover R1,057 Discovery Miles 10 570
Empowered or Left Behind - Use of…
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan Hardcover R1,448 Discovery Miles 14 480
Quick Python 3
David Matuszek Hardcover R2,426 Discovery Miles 24 260
The Adventurous and Practical Journey to…
FANAP Studies & Research Center Hardcover R3,029 Discovery Miles 30 290

 

Partners