0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (37)
  • R500+ (3,150)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Modelling Transitions - Virtues, Vices, Visions of the Future (Paperback): Enayat A. Moallemi, Fjalar J de Haan Modelling Transitions - Virtues, Vices, Visions of the Future (Paperback)
Enayat A. Moallemi, Fjalar J de Haan
R1,381 Discovery Miles 13 810 Ships in 12 - 19 working days

Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.

Linux with Operating System Concepts (Hardcover, 2nd edition): Richard Fox Linux with Operating System Concepts (Hardcover, 2nd edition)
Richard Fox
R6,631 Discovery Miles 66 310 Ships in 12 - 19 working days

1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.

Microarchitecture of Network-on-Chip Routers - A Designer's Perspective (Hardcover, 2015 ed.): Giorgos Dimitrakopoulos,... Microarchitecture of Network-on-Chip Routers - A Designer's Perspective (Hardcover, 2015 ed.)
Giorgos Dimitrakopoulos, Anastasios Psarras, Ioannis Seitanidis
R4,203 Discovery Miles 42 030 Ships in 12 - 19 working days

This book provides a unified overview of network-on-chip router micro-architecture, the corresponding design opportunities and challenges, and existing solutions to overcome these challenges. The discussion focuses on the heart of a NoC, the NoC router, and how it interacts with the rest of the system. Coverage includes both basic and advanced design techniques that cover the entire router design space including router organization, flow control, pipelined operation, buffering architectures, as well as allocators' structure and algorithms. Router micro-architectural options are presented in a step-by-step manner beginning from the basic design principles. Even highly sophisticated design alternatives are categorized and broken down to simpler pieces that can be understood easily and analyzed. This book is an invaluable reference for system, architecture, circuit, and EDA researchers and developers, who are interested in understanding the overall picture of NoC routers' architecture, the associated design challenges, and the available solutions.

Computer Logic - Design Principles and Applications (Hardcover, 2002 ed.): John Y. Hsu Computer Logic - Design Principles and Applications (Hardcover, 2002 ed.)
John Y. Hsu
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications. Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,132 Discovery Miles 31 320 Ships in 12 - 19 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

Applications of Machine Learning in Big-Data Analytics and Cloud Computing (Hardcover): Subhendu Kumar Pani, Somanath Tripathy,... Applications of Machine Learning in Big-Data Analytics and Cloud Computing (Hardcover)
Subhendu Kumar Pani, Somanath Tripathy, George Jandieri, Sumit Kundu, Talal Ashraf Butt
R3,034 Discovery Miles 30 340 Ships in 12 - 19 working days

Cloud Computing and Big Data technologies have become the new descriptors of the digital age. The global amount of digital data has increased more than nine times in volume in just five years and by 2030 its volume may reach a staggering 65 trillion gigabytes. This explosion of data has led to opportunities and transformation in various areas such as healthcare, enterprises, industrial manufacturing and transportation. New Cloud Computing and Big Data tools endow researchers and analysts with novel techniques and opportunities to collect, manage and analyze the vast quantities of data. In Cloud and Big Data Analytics, the two areas of Swarm Intelligence and Deep Learning are a developing type of Machine Learning techniques that show enormous potential for solving complex business problems. Deep Learning enables computers to analyze large quantities of unstructured and binary data and to deduce relationships without requiring specific models or programming instructions. This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics. The book will serve as a reference for Data Scientists, systems architects, developers, new researchers and graduate level students in Computer and Data science. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.

Software-Defined Networking for Future Internet Technology - Concepts and Applications (Hardcover): Kshira Sagar Sahoo,... Software-Defined Networking for Future Internet Technology - Concepts and Applications (Hardcover)
Kshira Sagar Sahoo, Bibhudatta Sahoo, Brojo Kishore Mishra
R3,860 Discovery Miles 38 600 Ships in 12 - 19 working days

Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. The book demonstrates the many benefits of SDN, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. Chapters in the volume address: Design considerations for security issues and detection methods State-of-the-art approaches for mitigating DDos attacks using SDN Big data using Apache Hadoop for processing and analyzing large amounts of data Different tools used for attack simulation Network policies and policy management approaches that are widely used in the context of SDN Dynamic flow tables, or static flow table management A new four-tiered architecture that includes cloud, SDN-controller, and fog computing Architecture for keeping computing resources available near the industrial IoT network through edge computing The impact of SDN as an innovative approach for smart city development More. The book will be a valuable resource for SDN researchers as well as academicians, research scholars, and students in the related areas.

Advanced Digital System Design using SoC FPGAs - An Integrated Hardware/Software Approach (Hardcover, 1st ed. 2023): Ross K.... Advanced Digital System Design using SoC FPGAs - An Integrated Hardware/Software Approach (Hardcover, 1st ed. 2023)
Ross K. Snider
R2,887 Discovery Miles 28 870 Ships in 12 - 19 working days

This textbook teaches students techniques for the design of advanced digital systems using System-on-Chip (SoC) Field Programmable Gate Arrays (FPGAs). The author demonstrates design of custom hardware components for the FPGA fabric using VHDL, with implementation of custom hardware-software interfaces. Readers gain hands-on experience by writing programs and Linux device drivers in C to interact with custom hardware. This textbook enables laboratory experience in the design of custom digital systems using SoC FPGAs, emphasizing computational tasks such as digital signal processing, audio, or video processing.

Collaboration with Cloud Computing - Security, Social Media, and Unified Communications (Paperback): Ric Messier Collaboration with Cloud Computing - Security, Social Media, and Unified Communications (Paperback)
Ric Messier
R1,161 Discovery Miles 11 610 Ships in 12 - 19 working days

"Collaboration with Cloud Computing "discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information securityThe risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutionsPresents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studiesExplores the risks associated with the use of social media to the enterprise networkCovers the bring-your-own-device(BYOD) trend, including policy considerations and technical requirements"

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,166 Discovery Miles 21 660 Ships in 12 - 19 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Internet of Things - Energy, Industry, and Healthcare (Hardcover): Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma,... Internet of Things - Energy, Industry, and Healthcare (Hardcover)
Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma, Shubham Tayal, Swati Gupta
R3,584 Discovery Miles 35 840 Ships in 12 - 19 working days

Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,731 Discovery Miles 37 310 Ships in 12 - 19 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover): Soumya Ranjan Nayak, Biswa... Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover)
Soumya Ranjan Nayak, Biswa Mohan Sahoo, Muthukumaran Malarvel, Jibitesh Mishra
R3,583 Discovery Miles 35 830 Ships in 12 - 19 working days

Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.

Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Paperback): Rosemary Wang Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Paperback)
Rosemary Wang
R1,263 Discovery Miles 12 630 Ships in 12 - 19 working days

Essential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.

Digital Twin Technology (Hardcover): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Hardcover)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R3,282 Discovery Miles 32 820 Ships in 12 - 19 working days

Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.

Time & Logic - A Computational Approach (Paperback): Leonard Bolc, Andrzej Szalas Time & Logic - A Computational Approach (Paperback)
Leonard Bolc, Andrzej Szalas
R1,180 Discovery Miles 11 800 Ships in 12 - 19 working days

Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.

Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover): R. Sujatha, S. L. Aarthy, R.... Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover)
R. Sujatha, S. L. Aarthy, R. Vettriselvan
R3,577 Discovery Miles 35 770 Ships in 12 - 19 working days

Provides insight into the skill set that requires leveraging strength to move further to act as a good data analyst Discusses how big data along with deep learning holds the potential to significantly increase data understanding and in turn, helps to make decisions Covers the numerous potential applications in healthcare, education, communications, media, and the entertainment industry Offers innovative platforms for integrating big data and deep learning Presents issues related to adequate data storage, sematic indexing, data tagging, and fast information retrieval from big data

Partnering with HMS: A Guide for App Developers (Hardcover): Xihai Wang, Yue Wang, Hailiang Wu Partnering with HMS: A Guide for App Developers (Hardcover)
Xihai Wang, Yue Wang, Hailiang Wu; Contributions by Zhang Zhou
R3,283 Discovery Miles 32 830 Ships in 12 - 19 working days

Partnering with HMS: A Guide for App Developers is the first book to introduce readers to the Huawei Mobile Services (HMS) ecosystem. It gives developers a fundamental understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better. This book is also a quick start guide for kit integration and practical environment setup, detailing the functions and principles behind each kit. By demonstrating how to integrate kits, the authors teach these kits by action: Account Kit, IAP, Push Kit, Location Kit, Map Kit, Site Kit, Safety Detect, and FIDO. Readers are fully introduced to how they can use HMS open capabilities to develop quality apps, acquire users, and monetize their hard work. In addition, the ecosystem background - the business model and value chain that underpin the entire ecosystem as well as its privacy compliance framework - is crucial to operations and illustrated in this book.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R4,178 Discovery Miles 41 780 Ships in 12 - 19 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,633 Discovery Miles 16 330 Ships in 12 - 19 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Sensing of Non-Volatile Memory Demystified (Hardcover, 1st ed. 2019): Swaroop Ghosh Sensing of Non-Volatile Memory Demystified (Hardcover, 1st ed. 2019)
Swaroop Ghosh
R2,603 Discovery Miles 26 030 Ships in 10 - 15 working days

This book introduces readers to the latest advances in sensing technology for a broad range of non-volatile memories (NVMs). Challenges across the memory technologies are highlighted and their solutions in mature technology are discussed, enabling innovation of sensing technologies for future NVMs. Coverage includes sensing techniques ranging from well-established NVMs such as hard disk, flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM, FeRAM and Domain Wall Memory will be covered.

Edge Computing and Capability-Oriented Architecture (Hardcover): Haishi Bai, Boris Scholl Edge Computing and Capability-Oriented Architecture (Hardcover)
Haishi Bai, Boris Scholl
R2,607 Discovery Miles 26 070 Ships in 12 - 19 working days

Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .

Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover): Anshul Verma, Pradeepika Verma, Sanjay... Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover)
Anshul Verma, Pradeepika Verma, Sanjay Kumar Dhurandher, Isaac Woungang
R4,044 Discovery Miles 40 440 Ships in 12 - 19 working days

The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Network and System Security (Paperback, 2nd edition): John Vacca Network and System Security (Paperback, 2nd edition)
John Vacca
R1,366 Discovery Miles 13 660 Ships in 12 - 19 working days

"Network and System Security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Advanced Symbolic Analysis for VLSI Systems - Methods and Applications (Hardcover, 2014 ed.): Guoyong Shi, Sheldon X. D. Tan,... Advanced Symbolic Analysis for VLSI Systems - Methods and Applications (Hardcover, 2014 ed.)
Guoyong Shi, Sheldon X. D. Tan, Esteban Tlelo-Cuautle
R5,009 Discovery Miles 50 090 Ships in 12 - 19 working days

This book provides comprehensive coverage of the recent advances in symbolic analysis techniques for design automation of nanometer VLSI systems. The presentation is organized in parts of fundamentals, basic implementation methods and applications for VLSI design. Topics emphasized include statistical timing and crosstalk analysis, statistical and parallel analysis, performance bound analysis and behavioral modeling for analog integrated circuits . Among the recent advances, the Binary Decision Diagram (BDD) based approaches are studied in depth. The BDD-based hierarchical symbolic analysis approaches, have essentially broken the analog circuit size barrier.
"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R971 R833 Discovery Miles 8 330
Advancements in Instrumentation and…
Srijan Bhattacharya Hardcover R6,657 Discovery Miles 66 570
Switched-Mode Power Supply Simulation…
Steven M. Sandler Hardcover R1,518 Discovery Miles 15 180
Applying Integration Techniques and…
Gabor Kecskemeti Hardcover R6,562 Discovery Miles 65 620
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald Hardcover R5,763 Discovery Miles 57 630
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,421 Discovery Miles 24 210
The Practice of Enterprise Architecture…
Svyatoslav Kotusev Hardcover R1,666 Discovery Miles 16 660
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,115 R950 Discovery Miles 9 500
Cyber-Physical Systems for Social…
Maya Dimitrova, Hiroaki Wagatsuma Hardcover R7,081 Discovery Miles 70 810
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R913 Discovery Miles 9 130

 

Partners