0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (40)
  • R500+ (3,172)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Hardware Architectures for Post-Quantum Digital Signature Schemes (Paperback, 1st ed. 2021): Deepraj Soni, Kanad Basu, Mohammed... Hardware Architectures for Post-Quantum Digital Signature Schemes (Paperback, 1st ed. 2021)
Deepraj Soni, Kanad Basu, Mohammed Nabeel, Najwa Aaraj, Marc Manzano, …
R2,998 Discovery Miles 29 980 Ships in 10 - 15 working days

This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.

Distributed Services with Go - Your Guide to Reliable, Scalable, and Maintainable Systems (Paperback): Travis Jeffrey Distributed Services with Go - Your Guide to Reliable, Scalable, and Maintainable Systems (Paperback)
Travis Jeffrey
R765 Discovery Miles 7 650 Ships in 12 - 17 working days

This is the book for Gophers who want to learn how to build distributed systems. You know the basics of Go and are eager to put your knowledge to work. Build distributed services that are highly available, resilient, and scalable. This book is just what you need to apply Go to real-world situations. Level up your engineering skills today. Take your Go skills to the next level by learning how to design, develop, and deploy a distributed service. Start from the bare essentials of storage handling, then work your way through networking a client and server, and finally to distributing server instances, deployment, and testing. All this will make coding in your day job or side projects easier, faster, and more fun. Create your own distributed services and contribute to open source projects. Build networked, secure clients and servers with gRPC. Gain insights into your systems and debug issues with observable services instrumented with metrics, logs, and traces. Operate your own Certificate Authority to authenticate internal web services with TLS. Automatically handle when nodes are added or removed to your cluster with service discovery. Coordinate distributed systems with replicated state machines powered by the Raft consensus algorithm. Lay out your applications and libraries to be modular and easy to maintain. Write CLIs to configure and run your applications. Run your distributed system locally and deploy to the cloud with Kubernetes. Test and benchmark your applications to ensure they're correct and fast. Dive into writing Go and join the hundreds of thousands who are using it to build software for the real world. What You Need: Go 1.13+ and Kubernetes 1.16+

Design and Test Strategies for 2D/3D Integration for NoC-based Multicore Architectures (Hardcover, 1st ed. 2020): Kanchan... Design and Test Strategies for 2D/3D Integration for NoC-based Multicore Architectures (Hardcover, 1st ed. 2020)
Kanchan Manna, Jimson Mathew
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book covers various aspects of optimization in design and testing of Network-on-Chip (NoC) based multicore systems. It gives a complete account of the state-of-the-art and emerging techniques for near optimal mapping and test scheduling for NoC-based multicores. The authors describe the use of the Integer Line Programming (ILP) technique for smaller benchmarks and a Particle Swarm Optimization (PSO) to get a near optimal mapping and test schedule for bigger benchmarks. The PSO-based approach is also augmented with several innovative techniques to get the best possible solution. The tradeoff between performance (communication or test time) of the system and thermal-safety is also discussed, based on designer specifications. Provides a single-source reference to design and test for circuit and system-level approaches to (NoC) based multicore systems; Gives a complete account of the state-of-the-art and emerging techniques for near optimal mapping and test scheduling in (NoC) based multicore systems; Organizes chapters systematically and hierarchically, rather than in an ad hoc manner, covering aspects of optimization in design and testing of Network-on-Chip (NoC) based multicore systems.

Proceedings of International Conference on Innovations in Software Architecture and Computational Systems - ISACS 2021... Proceedings of International Conference on Innovations in Software Architecture and Computational Systems - ISACS 2021 (Hardcover, 1st ed. 2021)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Aynur Unal, Santanu Kumar Sen
R5,305 Discovery Miles 53 050 Ships in 12 - 17 working days

This book gathers a collection of high-quality peer-reviewed research papers presented at First International Conference on Innovations in Software Architecture and Computational Systems (ISACS 2021), held at Guru Nanak Institute of Technology, Kolkata, India, during 2 - 3 April 2021. The book primarily focuses on developing artificial intelligence-based algorithms and methodologies for enabling intelligent hardware and software systems. This book brings together the latest findings on efficient technological solutions for developing intelligent and hybrid systems, intelligent software architecture, machine intelligence-based analytical tools and also smart sensors and networks. The prime focus is on solving technological problems using state-of-the-art research finding like fuzzy computing, evolutionary and hybrid frameworks, neuro-computing, etc., along with other AI-based computation platforms. The book offers a valuable resource for all undergraduate, postgraduate students and researchers interested in exploring solution frameworks for social good problems using artificial intelligence.

Embedded System Design - Embedded Systems Foundations of Cyber-Physical Systems, and the Internet of Things (Paperback, 4th ed.... Embedded System Design - Embedded Systems Foundations of Cyber-Physical Systems, and the Internet of Things (Paperback, 4th ed. 2021)
Peter Marwedel
R1,397 Discovery Miles 13 970 Ships in 10 - 15 working days

A unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This fourth edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems (CPS) and the Internet of things (IoT), the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.

Programming Massively Parallel Processors - A Hands-on Approach (Paperback, 4th edition): Wen-Mei W. Hwu, David B. Kirk, Izzat... Programming Massively Parallel Processors - A Hands-on Approach (Paperback, 4th edition)
Wen-Mei W. Hwu, David B. Kirk, Izzat El Hajj
R2,125 R1,896 Discovery Miles 18 960 Save R229 (11%) Ships in 12 - 17 working days

Programming Massively Parallel Processors: A Hands-on Approach shows both student and professional alike the basic concepts of parallel programming and GPU architecture. Various techniques for constructing parallel programs are explored in detail. Case studies demonstrate the development process, which begins with computational thinking and ends with effective and efficient parallel programs. Topics of performance, floating-point format, parallel patterns, and dynamic parallelism are covered in depth. For this new edition, the authors are updating their coverage of CUDA, including the concept of unified memory, and expanding content in areas such as threads, while still retaining its concise, intuitive, practical approach based on years of road-testing in the authors' own parallel computing courses.

Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021): Shuangbao Paul Wang Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021)
Shuangbao Paul Wang
R1,450 R1,369 Discovery Miles 13 690 Save R81 (6%) Ships in 9 - 15 working days

In today's workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author's recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.

Well-Quasi Orders in Computation, Logic, Language and Reasoning - A Unifying Concept of Proof Theory, Automata Theory, Formal... Well-Quasi Orders in Computation, Logic, Language and Reasoning - A Unifying Concept of Proof Theory, Automata Theory, Formal Languages and Descriptive Set Theory (Paperback, 1st ed. 2020)
Peter M. Schuster, Monika Seisenberger, Andreas Weiermann
R4,980 Discovery Miles 49 800 Ships in 10 - 15 working days

This book bridges the gaps between logic, mathematics and computer science by delving into the theory of well-quasi orders, also known as wqos. This highly active branch of combinatorics is deeply rooted in and between many fields of mathematics and logic, including proof theory, commutative algebra, braid groups, graph theory, analytic combinatorics, theory of relations, reverse mathematics and subrecursive hierarchies. As a unifying concept for slick finiteness or termination proofs, wqos have been rediscovered in diverse contexts, and proven to be extremely useful in computer science. The book introduces readers to the many facets of, and recent developments in, wqos through chapters contributed by scholars from various fields. As such, it offers a valuable asset for logicians, mathematicians and computer scientists, as well as scholars and students.

Digital Signal Processing for Multimedia Systems (Hardcover): Keshab K. Parhi, Takao Nishitami Digital Signal Processing for Multimedia Systems (Hardcover)
Keshab K. Parhi, Takao Nishitami
R2,482 Discovery Miles 24 820 Ships in 12 - 17 working days

Addresses a wide selection of multimedia applications, programmable and custom architectures for the implementations of multimedia systems, and arithmetic architectures and design methodologies. The book covers recent applications of digital signal processing algorithms in multimedia, presents high-speed and low-priority binary and finite field arithmetic architectures, details VHDL-based implementation approaches, and more.

Secrets of a Cyber Security Architect (Hardcover): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Hardcover)
Brook S. E. Schoenfield
R1,752 Discovery Miles 17 520 Ships in 12 - 17 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

Reliable Computer Systems - Design and Evaluation, Third Edition (Hardcover, 3rd edition): Daniel P. Siewiorek, Robert S. Swarz Reliable Computer Systems - Design and Evaluation, Third Edition (Hardcover, 3rd edition)
Daniel P. Siewiorek, Robert S. Swarz
R3,845 Discovery Miles 38 450 Ships in 12 - 17 working days

A comprehensive guide to understanding the standard and most recent advances in the design of reliable computer systems. It is organized into three sections, beginning with an in-depth review of existing reliability techniques and evaluation criteria for both hardware and software. also examined are the models for detecting faults and predicting failures, and the financial considerations which are inherent in the design, purchase, operation, and maintenance of a reliable system.

Biologically Inspired Cooperative Computing - IFIP 19th World Computer Congress, TC 10: 1st IFIP International Conference on... Biologically Inspired Cooperative Computing - IFIP 19th World Computer Congress, TC 10: 1st IFIP International Conference on Biologically Inspired Cooperative Computing, August 21-24, 2006, Santiago, Chile (Hardcover, 2006 ed.)
Yi Pan, Franz J. Rammig, Hartmut Schmeck, Mauricio Solar
R2,914 Discovery Miles 29 140 Ships in 10 - 15 working days

In the world of information technology, it is no longer the computer in the classical sense where the majority of IT applications is executed; computing is everywhere. More than 20 billion processors have already been fabricated and the majority of them can be assumed to still be operational. At the same time, virtually every PC worldwide is connected via the Internet. This combination of traditional and embedded computing creates an artifact of a complexity, heterogeneity, and volatility unmanageable by classical means. Each of our technical artifacts with a built-in processor can be seen as a ''Thing that Thinks," a term introduced by MIT's Thinglab. It can be expected that in the near future these billions of Things that Think will become an ''Internet of Things," a term originating from ETH Zurich. This means that we will be constantly surrounded by a virtual "organism" of Things that Think. This organism needs novel, adequate design, evolution, and management means which is also one of the core challenges addressed by the recent German priority research program on Organic Computing.

Advanced Computer Performance Modeling and Simulation (Hardcover): Kallol Bagchi, Jean Walrand, George Zobrist Advanced Computer Performance Modeling and Simulation (Hardcover)
Kallol Bagchi, Jean Walrand, George Zobrist
R3,049 Discovery Miles 30 490 Ships in 12 - 17 working days

Addresses the major issues involved in computer design and architectures. Dealing primarily with theory, tools, and techniques as related to advanced computer systems, it provides tutorials and surveys and relates new important research results. Each chapter provides background information, describes and analyzes important work done in the field, and provides important direction to the reader on future work and further readings. The topics covered include hierarchical design schemes, parallel and distributed modeling and simulation, parallel simulation tools and techniques, theoretical models for formal and performance modeling, and performance evaluation techniques.

Linux with Operating System Concepts (Paperback, 2nd edition): Richard Fox Linux with Operating System Concepts (Paperback, 2nd edition)
Richard Fox
R2,468 Discovery Miles 24 680 Ships in 12 - 17 working days

1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.

Software Architecture 2 (Hardcover): MC Oussalah Software Architecture 2 (Hardcover)
MC Oussalah
R3,720 Discovery Miles 37 200 Ships in 12 - 17 working days

Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.

The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Hardcover): Catarina... The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Hardcover)
Catarina Dutilh Novaes
R2,566 R2,248 Discovery Miles 22 480 Save R318 (12%) Ships in 12 - 17 working days

This comprehensive account of the concept and practices of deduction is the first to bring together perspectives from philosophy, history, psychology and cognitive science, and mathematical practice. Catarina Dutilh Novaes draws on all of these perspectives to argue for an overarching conceptualization of deduction as a dialogical practice: deduction has dialogical roots, and these dialogical roots are still largely present both in theories and in practices of deduction. Dutilh Novaes' account also highlights the deeply human and in fact social nature of deduction, as embedded in actual human practices; as such, it presents a highly innovative account of deduction. The book will be of interest to a wide range of readers, from advanced students to senior scholars, and from philosophers to mathematicians and cognitive scientists.

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,190 Discovery Miles 31 900 Ships in 10 - 15 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

A Synergistic Framework for Hardware IP Privacy and Integrity Protection (Paperback, 1st ed. 2020): Meng Li, David Z. Pan A Synergistic Framework for Hardware IP Privacy and Integrity Protection (Paperback, 1st ed. 2020)
Meng Li, David Z. Pan
R2,765 Discovery Miles 27 650 Ships in 10 - 15 working days

This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.

Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems (Hardcover, 1st ed. 2020): Marilyn Wolf, Dimitrios... Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems (Hardcover, 1st ed. 2020)
Marilyn Wolf, Dimitrios Serpanos
R2,309 Discovery Miles 23 090 Ships in 10 - 15 working days

This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people. Offers readers a unified view of safety and security, from basic concepts through research challenges; Provides a detailed comparison of safety and security methodologies; Describes a comprehensive threat model including attacks, design errors, and faults; Identifies important commonalities and differences in safety and security engineering.

Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems (Hardcover): K Suganthi, R. Karthik, G... Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems (Hardcover)
K Suganthi, R. Karthik, G Rajesh, Peter Ho Chiung Ching
R3,182 Discovery Miles 31 820 Ships in 12 - 17 working days

This book offers the latest advances and results in the fields of Machine Learning and Deep Learning for Wireless Communication and provides positive and critical discussions on the challenges and prospects. It provides a broad spectrum in understanding the improvements in Machine Learning and Deep Learning that are motivating by the specific constraints posed by wireless networking systems. The book offers an extensive overview on intelligent Wireless Communication systems and its underlying technologies, research challenges, solutions, and case studies. It provides information on intelligent wireless communication systems and its models, algorithms and applications. The book is written as a reference that offers the latest technologies and research results to various industry problems.

The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Paperback, 1st ed. 2020): Sylvain... The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Paperback, 1st ed. 2020)
Sylvain Clerc, Thierry Di Gilio, Andreia Cathelin
R3,553 Discovery Miles 35 530 Ships in 10 - 15 working days

This book discusses the advantages and challenges of Body-Biasing for integrated circuits and systems, together with the deployment of the design infrastructure needed to generate this Body-Bias voltage. These new design solutions enable state of the art energy efficiency and system flexibility for the latest applications, such as Internet of Things and 5G communications.

The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover): Parikshit N. Mahalle, Gitanjali Rahul Shinde,... The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover)
Parikshit N. Mahalle, Gitanjali Rahul Shinde, Nancy Ambritta P., Arvind Vinayak Deshpande
R1,508 Discovery Miles 15 080 Ships in 12 - 17 working days

Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application

Models, Methods, and Tools for Complex Chip Design - Selected Contributions from FDL 2012 (Hardcover, 2014 ed.): Jan Haase Models, Methods, and Tools for Complex Chip Design - Selected Contributions from FDL 2012 (Hardcover, 2014 ed.)
Jan Haase
R4,625 Discovery Miles 46 250 Ships in 12 - 17 working days

This book brings together a selection of the best papers from the fifteenth edition of the Forum on specification and Design Languages Conference (FDL), which was held in September 2012 at Vienna University of Technology, Vienna, Austria. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems.

Organizational Network Analysis - Auditing Intangible Resources (Paperback): Anna Ujwary-Gil Organizational Network Analysis - Auditing Intangible Resources (Paperback)
Anna Ujwary-Gil
R1,221 Discovery Miles 12 210 Ships in 12 - 17 working days

This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition)
Bongsik Shin
R1,381 Discovery Miles 13 810 Ships in 12 - 17 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R887 Discovery Miles 8 870
Digital Twin Technology
Gopal Chaudhary, Manju Khari, … Paperback R1,348 Discovery Miles 13 480
Constraint Decision-Making Systems in…
Santosh Kumar Das, Nilanjan Dey Hardcover R7,041 Discovery Miles 70 410
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R971 R797 Discovery Miles 7 970
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald Hardcover R5,608 Discovery Miles 56 080
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,185 Discovery Miles 11 850
Creativity in Load-Balance Schemes for…
Alberto Garcia-Robledo, Arturo Diaz Perez, … Hardcover R4,079 Discovery Miles 40 790
Heterogeneous Computing - Hardware and…
Mohamed Zahran Hardcover R1,585 Discovery Miles 15 850
Linux - The Ultimate Beginner's Guide to…
Ryan Turner Hardcover R1,062 R853 Discovery Miles 8 530
Advancements in Instrumentation and…
Srijan Bhattacharya Hardcover R6,481 Discovery Miles 64 810

 

Partners