0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (38)
  • R500+ (3,106)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Physical Assurance - For Electronic Devices and Systems (Hardcover, 1st ed. 2021): Navid Asadizanjani, Mir Tanjidur Rahman,... Physical Assurance - For Electronic Devices and Systems (Hardcover, 1st ed. 2021)
Navid Asadizanjani, Mir Tanjidur Rahman, Mark Tehranipoor
R2,885 Discovery Miles 28 850 Ships in 18 - 22 working days

This book provides readers with a comprehensive introduction to physical inspection-based approaches for electronics security. The authors explain the principles of physical inspection techniques including invasive, non-invasive and semi-invasive approaches and how they can be used for hardware assurance, from IC to PCB level. Coverage includes a wide variety of topics, from failure analysis and imaging, to testing, machine learning and automation, reverse engineering and attacks, and countermeasures.

Sustainable Enterprise Architecture (Hardcover): Kirk Hausman Sustainable Enterprise Architecture (Hardcover)
Kirk Hausman
R2,531 Discovery Miles 25 310 Ships in 10 - 15 working days

Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise. Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design. The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy. Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.

Uncoded Multimedia Transmission (Hardcover): Feng Wu, Chong Luo, Hancheng Lu Uncoded Multimedia Transmission (Hardcover)
Feng Wu, Chong Luo, Hancheng Lu
R3,227 Discovery Miles 32 270 Ships in 10 - 15 working days

An uncoded multimedia transmission (UMT) system is one that skips quantization and entropy coding in compression and all subsequent binary operations, including channel coding and bit-to-symbol mapping of modulation. By directly transmitting non-binary symbols with amplitude modulation, the uncoded system avoids the annoying cliff effect observed in the coded transmission system. This advantage makes uncoded transmission more suited to both unicast in varying channel conditions and multicast to heterogeneous users. Particularly, in the first part of Uncoded Multimedia Transmission, we consider how to improve the efficiency of uncoded transmission and make it on par with coded transmission. We then address issues and challenges regarding how to better utilize temporal and spatial correlation of images and video in the uncoded transmission, to achieve the optimal transmission performance. Next, we investigate the resource allocation problem for uncoded transmission, including subchannel, bandwidth and power allocation. By properly allocating these resources, uncoded transmission can achieve higher efficiency and more robust performance. Subsequently, we consider the image and video delivery in MIMO broadcasting networks with diverse channel quality and varying numbers of antennas across receivers. Finally, we investigate the cases where uncoded transmission can be used in conjunction with digital transmission for a balanced efficiency and adaptation capability. This book is the very first monograph in the general area of uncoded multimedia transmission written in a self-contained format. It addresses both the fundamentals and the applications of uncoded transmission. It gives a systematic introduction to the fundamental theory and concepts in this field, and at the same time, also presents specific applications that reveal the great potential and impacts for the technologies generated from the research in this field. By concentrating several important studies and developments currently taking place in the field of uncoded transmission in a single source, this book can reduce the time and cost required to learn and improve skills and knowledge in the field. The authors have been actively working in this field for years, and this book is the final essence of their years of long research in this field. The book may be used as a collection of research notes for researchers in this field, a reference book for practitioners or engineers, as well as a textbook for a graduate advanced seminar in this field or any related fields. The references collected in this book may be used as further reading lists or references for the readers.

Hardware Security and Trust - Design and Deployment of Integrated Circuits in a Threatened Environment (Hardcover, 1st ed.... Hardware Security and Trust - Design and Deployment of Integrated Circuits in a Threatened Environment (Hardcover, 1st ed. 2017)
Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

Logic of Computation (Hardcover): Helmut Schwichtenberg Logic of Computation (Hardcover)
Helmut Schwichtenberg
R2,457 Discovery Miles 24 570 Ships in 18 - 22 working days

The latest work by the world's leading authorities on the use of formal methods in computer science is presented in this volume, based on the 1995 International Summer School in Marktoberdorf, Germany. Logic is of special importance in computer science, since it provides the basis for giving correct semantics of programs, for specification and verification of software, and for program synthesis. The lectures presented here provide the basic knowledge a researcher in this area should have and give excellent starting points for exploring the literature. Topics covered include semantics and category theory, machine based theorem proving, logic programming, bounded arithmetic, proof theory, algebraic specifications and rewriting, algebraic algorithms, and type theory.

Testing Complex and Embedded Systems (Hardcover): Kim H Pries, Jon M. Quigley Testing Complex and Embedded Systems (Hardcover)
Kim H Pries, Jon M. Quigley
R3,240 Discovery Miles 32 400 Ships in 10 - 15 working days

Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the last minute. Presenting combinatorial approaches for improving test coverage, Testing Complex and Embedded Systems details techniques to help you streamline testing and identify problems before they occur -- including turbocharged testing using Six Sigma and exploratory testing methods. Rather than present the continuum of testing for particular products or design attributes, the text focuses on boundary conditions. Examining systems and software testing, it explains how to use simulation and emulation to complement testing. * Details how to manage multiple test hardware and software deliveries * Examines the contradictory perspectives of testing -- including ordered/ random, structured /unstructured, bench/field, and repeatable/non repeatable * Covers essential planning activities prior to testing, how to scope the work, and how to reach a successful conclusion * Explains how to determine when testing is complete Where you find organizations that are successful at product development, you are likely to find groups that practice disciplined, strategic, and thorough testing. Tapping into the authors' decades of experience managing test groups in the automotive industry, this book provides the understanding to help ensure your organization joins the likes of these groups.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Parallel Optimization - Theory, Algorithms and Applications (Hardcover, Reissue): Yair Censor, Stavros A. Zenios Parallel Optimization - Theory, Algorithms and Applications (Hardcover, Reissue)
Yair Censor, Stavros A. Zenios
R6,136 Discovery Miles 61 360 Ships in 10 - 15 working days

This book offers a unique pathway to methods of parallel optimization by introducing parallel computing ideas and techniques into both optimization theory, and into some numerical algorithms for large-scale optimization problems. The presentation is based on the recent understanding that rigorous mathematical analysis of algorithms, parallel computing techniques, and "hands-on" experimental work on real-world problems must go hand in hand in order to achieve the greatest advantage from novel parallel computing architectures. The three parts of the book thus bring together relevant theory, careful study of algorithms, and modelling of significant real world problems. The problem domains include: image reconstruction, radiation therapy treatment planning, transportation problems, portfolilo management, and matrix estimation. This text can be used both as a reference for researchers and as a text for advanced graduate courses.

Trusted Computing for Embedded Systems (Hardcover, 2015 ed.): Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos Trusted Computing for Embedded Systems (Hardcover, 2015 ed.)
Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos
R4,276 R3,475 Discovery Miles 34 750 Save R801 (19%) Ships in 10 - 15 working days

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. * Enables readers to address a variety of security threats to embedded hardware and software; * Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; * Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover): Neeraj Kumar, Arzoo Miglani Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover)
Neeraj Kumar, Arzoo Miglani
R4,216 Discovery Miles 42 160 Ships in 10 - 15 working days

This book covers theory and practical knowledge of Probabilistic data structures (PDS) and Blockchain (BC) concepts. It introduces the applicability of PDS in BC to technology practitioners and explains each PDS through code snippets and illustrative examples. Further, it provides references for the applications of PDS to BC along with implementation codes in python language for various PDS so that the readers can gain confidence using hands on experience. Organized into five sections, the book covers IoT technology, fundamental concepts of BC, PDS and algorithms used to estimate membership query, cardinality, similarity and frequency, usage of PDS in BC based IoT and so forth.

IP Routing Protocols - Two-Volume Set (Paperback): James Aweya IP Routing Protocols - Two-Volume Set (Paperback)
James Aweya
R2,950 Discovery Miles 29 500 Ships in 10 - 15 working days

This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Unlike other books, this title is not vendor focused. Volume 1 discusses fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Volume 2 focuses on link-state routing protocols (OSPF and IS-IS) and the only path-vector routing protocol in use today (BGP). The volumes explain the types of databases each routing protocol uses, how the databases are constructed and managed, and how the various protocol components and processes, relate and interact with the databases. They also describe the routing protocols from a systems perspective, recognizing the most important routing and packet forwarding components and functions of a router. An illustrated description of IP routing protocols is given using real-world network examples. The books are presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers.

LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover):... LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover)
Hossam Fattah
R3,248 Discovery Miles 32 480 Ships in 10 - 15 working days

NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance, such as: increased area coverage of up to one kilometer; a massive number of devices-up to 200,000-per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal, such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book, covering many use cases and scenarios, this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino (TM), Amazon Cloud, Google Maps, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules, policy, security certificates, and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols, such as TCP, HTTP, SSL, or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects, such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices, such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators, such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, and electronics enthusiasts. To download the software which can be used with the book, go to: https://github.com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada in 2000. He completed his B.Sc. degree in Computers and Systems Engineering from Al-Azhar University, Cairo, Egypt in 1995. Between 2003 and 2011, he was in academia and industry, including Texas A&M University. Between 2011 and 2013, he was with Spirent Communications, NJ, USA. Since 2013, he has been with Microsoft, USA. He is also an affiliate associate professor at University of Washington, Tacoma, WA, USA, teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers, British Columbia, Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols, cellular quality of service, radio resource management, traffic and packet scheduling, network analytics, and mobility.

Parallel Computing (Hardcover): Moreshwar R. Bhujade Parallel Computing (Hardcover)
Moreshwar R. Bhujade
R1,020 Discovery Miles 10 200 Ships in 10 - 15 working days

The book "Parallel Computing" deals with the topics of current interest in high performance computing, viz. pipeline and parallel processing architectures, and the whole book is based on treatment of these ideas. The present revised edition is updated with the addition of topics like processor performance and technology developments in chapter 1 and advanced pipeline processing on today's high performance processors in chapter 2. A new chapter on neurocomputing and two new sections on Branch prediction and scoreboard are the other major changes done to make the book more viable.

Machine Learning for Model Order Reduction (Hardcover, 1st ed. 2018): Khaled Salah Mohamed Machine Learning for Model Order Reduction (Hardcover, 1st ed. 2018)
Khaled Salah Mohamed
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This Book discusses machine learning for model order reduction, which can be used in modern VLSI design to predict the behavior of an electronic circuit, via mathematical models that predict behavior. The author describes techniques to reduce significantly the time required for simulations involving large-scale ordinary differential equations, which sometimes take several days or even weeks. This method is called model order reduction (MOR), which reduces the complexity of the original large system and generates a reduced-order model (ROM) to represent the original one. Readers will gain in-depth knowledge of machine learning and model order reduction concepts, the tradeoffs involved with using various algorithms, and how to apply the techniques presented to circuit simulations and numerical analysis. Introduces machine learning algorithms at the architecture level and the algorithm levels of abstraction; Describes new, hybrid solutions for model order reduction; Presents machine learning algorithms in depth, but simply; Uses real, industrial applications to verify algorithms.

Embedded Systems - A Hardware-Software Co-Design Approach - Unleash the Power of Arduino! (Hardcover, 1st ed. 2021): Bashir I... Embedded Systems - A Hardware-Software Co-Design Approach - Unleash the Power of Arduino! (Hardcover, 1st ed. 2021)
Bashir I Morshed
R1,897 Discovery Miles 18 970 Ships in 10 - 15 working days

This textbook introduces the concept of embedded systems with exercises using Arduino Uno. It is intended for advanced undergraduate and graduate students in computer science, computer engineering, and electrical engineering programs. It contains a balanced discussion on both hardware and software related to embedded systems, with a focus on co-design aspects. Embedded systems have applications in Internet-of-Things (IoT), wearables, self-driving cars, smart devices, cyberphysical systems, drones, and robotics. The hardware chapter discusses various microcontrollers (including popular microcontroller hardware examples), sensors, amplifiers, filters, actuators, wired and wireless communication topologies, schematic and PCB designs, and much more. The software chapter describes OS-less programming, bitmath, polling, interrupt, timer, sleep modes, direct memory access, shared memory, mutex, and smart algorithms, with lots of C-code examples for Arduino Uno. Other topics discussed are prototyping, testing, verification, reliability, optimization, and regulations. Appropriate for courses on embedded systems, microcontrollers, and instrumentation, this textbook teaches budding embedded system programmers practical skills with fun projects to prepare them for industry products. Introduces embedded systems for wearables, Internet-of-Things (IoT), robotics, and other smart devices; Offers a balanced focus on both hardware and software co-design of embedded systems; Includes exercises, tutorials, and assignments.

Computer Technology and Computer Programming - Research and Strategies (Paperback): James L. Antonakos Computer Technology and Computer Programming - Research and Strategies (Paperback)
James L. Antonakos
R2,469 Discovery Miles 24 690 Ships in 10 - 15 working days

This title includes a number of Open Access chapters. Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

Parallel Algorithms (Paperback): Henri Casanova, Arnaud Legrand, Yves Robert Parallel Algorithms (Paperback)
Henri Casanova, Arnaud Legrand, Yves Robert
R1,483 Discovery Miles 14 830 Ships in 10 - 15 working days

Focusing on algorithms for distributed-memory parallel architectures, Parallel Algorithms presents a rigorous yet accessible treatment of theoretical models of parallel computation, parallel algorithm design for homogeneous and heterogeneous platforms, complexity and performance analysis, and essential notions of scheduling. The book extracts fundamental ideas and algorithmic principles from the mass of parallel algorithm expertise and practical implementations developed over the last few decades. In the first section of the text, the authors cover two classical theoretical models of parallel computation (PRAMs and sorting networks), describe network models for topology and performance, and define several classical communication primitives. The next part deals with parallel algorithms on ring and grid logical topologies as well as the issue of load balancing on heterogeneous computing platforms. The final section presents basic results and approaches for common scheduling problems that arise when developing parallel algorithms. It also discusses advanced scheduling topics, such as divisible load scheduling and steady-state scheduling. With numerous examples and exercises in each chapter, this text encompasses both the theoretical foundations of parallel algorithms and practical parallel algorithm design.

The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback): Wu-chun Feng The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback)
Wu-chun Feng
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

State-of-the-Art Approaches to Advance the Large-Scale Green Computing Movement Edited by one of the founders and lead investigator of the Green500 list, The Green Computing Book: Tackling Energy Efficiency at Large Scale explores seminal research in large-scale green computing. It begins with low-level, hardware-based approaches and then traverses up the software stack with increasingly higher-level, software-based approaches. In the first chapter, the IBM Blue Gene team illustrates how to improve the energy efficiency of a supercomputer by an order of magnitude without any system performance loss in parallelizable applications. The next few chapters explain how to enhance the energy efficiency of a large-scale computing system via compiler-directed energy optimizations, an adaptive run-time system, and a general prediction performance framework. The book then explores the interactions between energy management and reliability and describes storage system organization that maximizes energy efficiency and reliability. It also addresses the need for coordinated power control across different layers and covers demand response policies in computing centers. The final chapter assesses the impact of servers on data center costs.

Smart Proxy Modeling - Artificial Intelligence and Machine Learning in Numerical Simulation (Hardcover): Shahab D. Mohaghegh Smart Proxy Modeling - Artificial Intelligence and Machine Learning in Numerical Simulation (Hardcover)
Shahab D. Mohaghegh
R2,825 Discovery Miles 28 250 Ships in 9 - 17 working days

Numerical simulation models are used in all engineering disciplines for modeling physical phenomena to learn how the phenomena work, and to identify problems and optimize behavior. Smart Proxy Models provide an opportunity to replicate numerical simulations with very high accuracy and can be run on a laptop within a few minutes, thereby simplifying the use of complex numerical simulations, which can otherwise take tens of hours. This book focuses on Smart Proxy Modeling and provides readers with all the essential details on how to develop Smart Proxy Models using Artificial Intelligence and Machine Learning, as well as how it may be used in real-world cases. Covers replication of highly accurate numerical simulations using Artificial Intelligence and Machine Learning Details application in reservoir simulation and modeling and computational fluid dynamics Includes real case studies based on commercially available simulators Smart Proxy Modeling is ideal for petroleum, chemical, environmental, and mechanical engineers, as well as statisticians and others working with applications of data-driven analytics.

Handbook of SCADA/Control Systems Security (Paperback, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Paperback, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R1,323 Discovery Miles 13 230 Ships in 10 - 15 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Software Engineering Practice - A Case Study Approach (Paperback): Thomas B. Hilburn, Massood Towhidnejad Software Engineering Practice - A Case Study Approach (Paperback)
Thomas B. Hilburn, Massood Towhidnejad
R2,161 Discovery Miles 21 610 Ships in 10 - 15 working days

This book is a broad discussion covering the entire software development lifecycle. It uses a comprehensive case study to address each topic and features the following: A description of the development, by the fictional company Homeowner, of the DigitalHome (DH) System, a system with "smart" devices for controlling home lighting, temperature, humidity, small appliance power, and security A set of scenarios that provide a realistic framework for use of the DH System material Just-in-time training: each chapter includes mini tutorials introducing various software engineering topics that are discussed in that chapter and used in the case study A set of case study exercises that provide an opportunity to engage students in software development practice, either individually or in a team environment. Offering a new approach to learning about software engineering theory and practice, the text is specifically designed to: Support teaching software engineering, using a comprehensive case study covering the complete software development lifecycle Offer opportunities for students to actively learn about and engage in software engineering practice Provide a realistic environment to study a wide array of software engineering topics including agile development Software Engineering Practice: A Case Study Approach supports a student-centered, "active" learning style of teaching. The DH case study exercises provide a variety of opportunities for students to engage in realistic activities related to the theory and practice of software engineering. The text uses a fictitious team of software engineers to portray the nature of software engineering and to depict what actual engineers do when practicing software engineering. All the DH case study exercises can be used as team or group exercises in collaborative learning. Many of the exercises have specific goals related to team building and teaming skills. The text also can be used to support the professional development or certification of practicing software engineers. The case study exercises can be integrated with presentations in a workshop or short course for professionals.

Parallel Computers 2 - Architecture, Programming and Algorithms (Paperback): R.W. Hockney, C.R. Jesshope Parallel Computers 2 - Architecture, Programming and Algorithms (Paperback)
R.W. Hockney, C.R. Jesshope
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

Since the publication of the first edition, parallel computing technology has gained considerable momentum. A large proportion of this has come from the improvement in VLSI techniques, offering one to two orders of magnitude more devices than previously possible. A second contributing factor in the fast development of the subject is commercialization. The supercomputer is no longer restricted to a few well-established research institutions and large companies. A new computer breed combining the architectural advantages of the supercomputer with the advance of VLSI technology is now available at very attractive prices. A pioneering device in this development is the transputer, a VLSI processor specifically designed to operate in large concurrent systems. Parallel Computers 2: Architecture, Programming and Algorithms reflects the shift in emphasis of parallel computing and tracks the development of supercomputers in the years since the first edition was published. It looks at large-scale parallelism as found in transputer ensembles. This extensively rewritten second edition includes major new sections on the transputer and the OCCAM language. The book contains specific information on the various types of machines available, details of computer architecture and technologies, and descriptions of programming languages and algorithms. Aimed at an advanced undergraduate and postgraduate level, this handbook is also useful for research workers, machine designers, and programmers concerned with parallel computers. In addition, it will serve as a guide for potential parallel computer users, especially in disciplines where large amounts of computer time are regularly used.

Approximate Computing Techniques - From Component- to Application-Level (Hardcover, 1st ed. 2022): Alberto Bosio, Daniel... Approximate Computing Techniques - From Component- to Application-Level (Hardcover, 1st ed. 2022)
Alberto Bosio, Daniel Menard, Olivier Sentieys
R3,378 Discovery Miles 33 780 Ships in 10 - 15 working days

This book serves as a single-source reference to the latest advances in Approximate Computing (AxC), a promising technique for increasing performance or reducing the cost and power consumption of a computing system. The authors discuss the different AxC design and validation techniques, and their integration. They also describe real AxC applications, spanning from mobile to high performance computing and also safety-critical applications.

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable... Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable Distributed Applications and Media Control over Internet (Hardcover)
Radhika Ranjan Roy
R5,175 Discovery Miles 51 750 Ships in 10 - 15 working days

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Clean Architecture - A Craftsman's Guide…
Robert Martin Paperback  (1)
R860 R741 Discovery Miles 7 410
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic Hardcover R4,204 Discovery Miles 42 040
Dual Quaternions and Their Associated…
Ronald Goldman Paperback R1,369 Discovery Miles 13 690
Modeling and Simulation of Invasive…
Sascha Roloff, Frank Hannig, … Hardcover R2,653 Discovery Miles 26 530
Thinking Machines - Machine Learning and…
Shigeyuki Takano Paperback R2,011 Discovery Miles 20 110
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,199 Discovery Miles 11 990
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues Paperback R4,669 Discovery Miles 46 690
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810
Linux - The Ultimate Beginner's Guide to…
Ryan Turner Hardcover R979 R827 Discovery Miles 8 270
Advancements in Instrumentation and…
Srijan Bhattacharya Hardcover R6,138 Discovery Miles 61 380

 

Partners