0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (319)
  • R250 - R500 (925)
  • R500+ (16,307)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Application Servers for E-Business (Hardcover): Lisa E Lindgren Application Servers for E-Business (Hardcover)
Lisa E Lindgren
R4,601 Discovery Miles 46 010 Ships in 12 - 17 working days

The modern application server is a complex platform that is the linchpin of an enterprise environment that includes a very wide range of technologies-web document formatting, web protocols, server-side scripts, servlets, applets, programming languages, distributed object technologies, security capabilities, directory and naming services, load balancing, system management, and others. As such, it can be a daunting task to try to comprehend these systems. Application Servers for E-Business helps you understand the use of application servers in e-business. The book presents a comprehensive overview of the technologies related to application servers in their facilitation of E-business. These technologies include CORBA, Java, Enterprise Java Beans, Java 2, web servers, and legacy systems. It explores the role these servers play in the modern enterprise IT infrastructure and the environment in which they operate. The material also includes implementation considerations for application servers, including security, scalability, load balancing, and fault tolerance. Chapter one provides an overview of application servers, the evolution of computing that took us from hierarchical, mainframe-centric environments to the web model of computing, and the rationale for E-commerce and E-business. Chapters two through five cover specific technologies, from web browsers and servers to applets and servlets. Chapter three provides an overview of Java technologies, and chapter four covers CORBA. Chapter five discusses application servers in detail. Since application servers are increasingly supporting the key mission-critical processes of an enterprise, it is critical that organizations deploying them build in "enterprise-class" facilities for security, scalability, load balancing, fault tolerance, and management. Chapter six discusses these deployment design issues. The book concludes with chapter seven, a chapter that presents several examples of the advantages of application ser

Stakeholder Engagement - The Game Changer for Program Management (Hardcover): Amy Baugh Stakeholder Engagement - The Game Changer for Program Management (Hardcover)
Amy Baugh
R3,386 Discovery Miles 33 860 Ships in 12 - 17 working days

Strong stakeholder engagement is perhaps the most critical factor for achieving successful program execution in our fast-paced world. Many program managers get stuck in the "science" of program management, spending vast amounts of effort on tasks, charts, and metrics. Program managers who emphasize activities around relationship building and stakeholder engagement usually have the best chance for program success. This book focuses on how to engage your stakeholders in the right way, and keep them engaged throughout the course of your program. The first section of the book covers stakeholder engagement in the program definition phase, including how to identify key stakeholders, gain their trust, and build relationships through effective communication. The second section moves to the project execution phase. It explains how to drive stakeholder engagement through the use of performance metrics, effective meeting management, and informal program governance. In the last section, the author explains how to keep stakeholders engaged through the program closure phase. This section covers the operational readiness review, including transition plans, new process documentation and training, new technology rollout, and cultural readiness assessment. It also provides best practices and tips for holding the post-launch review and lessons learned session. The book concludes with a case study of a fictitious company, followed by discussion questions that allow you to apply the knowledge you have gained in this book.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,237 Discovery Miles 32 370 Ships in 12 - 17 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Guide to Cloud Computing for Business and Technology Managers - From Distributed Computing to Cloudware Applications... Guide to Cloud Computing for Business and Technology Managers - From Distributed Computing to Cloudware Applications (Hardcover)
Vivek Kale
R4,046 Discovery Miles 40 460 Ships in 12 - 17 working days

Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book: Introduces the enterprise applications integration (EAI) solutions that were a first step toward enabling an integrated enterprise Details service-oriented architecture (SOA) and related technologies that paved the road for cloudware applications Covers delivery models like IaaS, PaaS, and SaaS, and deployment models like public, private, and hybrid clouds Describes Amazon, Google, and Microsoft cloudware solutions and services, as well as those of several other players Demonstrates how cloud computing can reduce costs, achieve business flexibility, and sharpen strategic focus Unlike customary discussions of cloud computing, Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications emphasizes the key differentiator-that cloud computing is able to treat enterprise-level services not merely as discrete stand-alone services, but as Internet-locatable, composable, and repackageable building blocks for generating dynamic real-world enterprise business processes.

Software Defined Networking - Design and Deployment (Hardcover): Patricia A. Morreale, James M. Anderson Software Defined Networking - Design and Deployment (Hardcover)
Patricia A. Morreale, James M. Anderson
R3,001 Discovery Miles 30 010 Ships in 12 - 17 working days

Software Defined Networking: Design and Deployment provides a comprehensive treatment of software defined networking (SDN) suitable for new network managers and experienced network professionals. Presenting SDN in context with more familiar network services and challenges, this accessible text: Explains the importance of virtualization, particularly the impact of virtualization on servers and networks Addresses SDN, with an emphasis on the network control plane Discusses SDN implementation and the impact on service providers, legacy networks, and network vendors Contains a case study on Google's initial implementation of SDN Investigates OpenFlow, the hand-in-glove partner of SDN Looks forward toward more programmable networks and the languages needed to manage these environments Software Defined Networking: Design and Deployment offers a unique perspective of the business case and technology motivations for considering SDN solutions. By identifying the impact of SDN on traffic management and the potential for network service growth, this book instills the knowledge needed to manage current and future demand and provisioning for SDN.

The CIO’s Guide to Information Security Incident Management (Paperback): Matthew William Arthur Pemble, Wendy Fiona Goucher The CIO’s Guide to Information Security Incident Management (Paperback)
Matthew William Arthur Pemble, Wendy Fiona Goucher
R1,386 Discovery Miles 13 860 Ships in 12 - 17 working days

This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements.

SMACing the Bank - How to Use Social Media, Mobility, Analytics and Cloud Technologies to Transform the Business Processes of... SMACing the Bank - How to Use Social Media, Mobility, Analytics and Cloud Technologies to Transform the Business Processes of Banks and the Banking Experience (Paperback)
Balaji Raghunathan, Rajashekara Maiya
R1,398 Discovery Miles 13 980 Ships in 12 - 17 working days

The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise IT model delivering an organization that is more connective, collaborative, real time and productive. This book provides a comprehensive view of how SMAC Technologies are impacting the entire banking "eco-system" as well as the key stakeholders, namely customers, employees and partners.

Kubernetes Patterns - Reusable Elements for Designing Cloud Native Applications (Paperback): Bilgin Ibryam, Roland Huss Kubernetes Patterns - Reusable Elements for Designing Cloud Native Applications (Paperback)
Bilgin Ibryam, Roland Huss
R1,211 R863 Discovery Miles 8 630 Save R348 (29%) Out of stock

The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures use new principles that require a different set of practices than most developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huss from Red Hat provide common reusable elements, patterns, principles, and practices for designing and implementing cloud native applications on Kubernetes. Each recipe includes a description of the problem and a proposed solution with Kubernetes specifics. Many patterns are also backed by concrete code examples. This book is ideal for developers already familiar with basic Kubernetes concepts who want to learn common cloud native patterns. You'll learn about the following pattern categories: Foundational patterns cover the core principles and practices for building container-based cloud native applications Behavioral patterns add finer grained concepts for managing various types of container and platform interactions Structural patterns help you organize containers within a Pod, the atom of the Kubernetes platform Configuration patterns provide insight into how application configuration can be handled in Kubernetes Advanced patterns include a collection of advanced concepts like extending the platform itself

E-Government and Websites - A Public Solutions Handbook (Hardcover): Aroon Manoharan E-Government and Websites - A Public Solutions Handbook (Hardcover)
Aroon Manoharan
R4,444 Discovery Miles 44 440 Ships in 12 - 17 working days

This book presents a citizen-centric perspective of the dual components of e-government and e-governance. E-government refers to the practice of online public reporting by government to citizens, and to service delivery via the Internet. E-governance represents the initiatives for citizens to participate and provide their opinion on government websites. This volume in the Public Solutions Handbook Series focuses on various e-government initiatives from the United States and abroad, and will help guide public service practitioners in their transformation to e-government. The book provides important recommendations and suggestions oriented towards practitioners, and makes a significant contribution to e-government by showcasing successful models and highlighting the lessons learned in the implementation processes. Chapter coverage includes: * Online fiscal transparency * Performance reporting * Improving citizen participation * Privacy issues in e-governance * Internet voting * E-government at the local level

Hardware Security - Design, Threats, and Safeguards (Hardcover): Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Hardware Security - Design, Threats, and Safeguards (Hardcover)
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
R4,047 Discovery Miles 40 470 Ships in 12 - 17 working days

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC)."

Gain a Comprehensive Understanding of Hardware Security from Fundamentals to Practical Applications"

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention
"

Design for Security and Meet Real-Time Requirements"

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards."

Cooperative Control of Multi-Agent Systems - A Consensus Region Approach (Hardcover): Zhong-Kui Li, Zhisheng Duan Cooperative Control of Multi-Agent Systems - A Consensus Region Approach (Hardcover)
Zhong-Kui Li, Zhisheng Duan
R5,934 Discovery Miles 59 340 Ships in 12 - 17 working days

Distributed controller design is generally a challenging task, especially for multi-agent systems with complex dynamics, due to the interconnected effect of the agent dynamics, the interaction graph among agents, and the cooperative control laws. Cooperative Control of Multi-Agent Systems: A Consensus Region Approach offers a systematic framework for designing distributed controllers for multi-agent systems with general linear agent dynamics, linear agent dynamics with uncertainties, and Lipschitz nonlinear agent dynamics. Beginning with an introduction to cooperative control and graph theory, this monograph: Explores the consensus control problem for continuous-time and discrete-time linear multi-agent systems Studies the H and H2 consensus problems for linear multi-agent systems subject to external disturbances Designs distributed adaptive consensus protocols for continuous-time linear multi-agent systems Considers the distributed tracking control problem for linear multi-agent systems with a leader of nonzero control input Examines the distributed containment control problem for the case with multiple leaders Covers the robust cooperative control problem for multi-agent systems with linear nominal agent dynamics subject to heterogeneous matching uncertainties Discusses the global consensus problem for Lipschitz nonlinear multi-agent systems Cooperative Control of Multi-Agent Systems: A Consensus Region Approach provides a novel approach to designing distributed cooperative protocols for multi-agent systems with complex dynamics. The proposed consensus region decouples the design of the feedback gain matrices of the cooperative protocols from the communication graph and serves as a measure for the robustness of the protocols to variations of the communication graph. By exploiting the decoupling feature, adaptive cooperative protocols are presented that can be designed and implemented in a fully distributed fashion.

E-Government and Websites - A Public Solutions Handbook (Paperback): Aroon Manoharan E-Government and Websites - A Public Solutions Handbook (Paperback)
Aroon Manoharan
R1,411 Discovery Miles 14 110 Ships in 12 - 17 working days

This book presents a citizen-centric perspective of the dual components of e-government and e-governance. E-government refers to the practice of online public reporting by government to citizens, and to service delivery via the Internet. E-governance represents the initiatives for citizens to participate and provide their opinion on government websites. This volume in the Public Solutions Handbook Series focuses on various e-government initiatives from the United States and abroad, and will help guide public service practitioners in their transformation to e-government. The book provides important recommendations and suggestions oriented towards practitioners, and makes a significant contribution to e-government by showcasing successful models and highlighting the lessons learned in the implementation processes. Chapter coverage includes: * Online fiscal transparency * Performance reporting * Improving citizen participation * Privacy issues in e-governance * Internet voting * E-government at the local level

Secure Development for Mobile Apps - How to Design and Code Secure Mobile Applications with PHP and JavaScript (Paperback): J.... Secure Development for Mobile Apps - How to Design and Code Secure Mobile Applications with PHP and JavaScript (Paperback)
J. D. Glaser
R1,712 Discovery Miles 17 120 Ships in 12 - 17 working days

The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software security should be of primary concern to every mobile application developer. This book explains how you can create mobile social applications that incorporate security throughout the development process. Although there are many books that address security issues, most do not explain how to incorporate security into the building process. Secure Development for Mobile Apps does exactly that. Its step-by-step guidance shows you how to integrate security measures into social apps running on mobile platforms. You'll learn how to design and code apps with security as part of the process and not an afterthought. The author outlines best practices to help you build better, more secure software. This book provides a comprehensive guide to techniques for secure development practices. It covers PHP security practices and tools, project layout templates, PHP and PDO, PHP encryption, and guidelines for secure session management, form validation, and file uploading. The book also demonstrates how to develop secure mobile apps using the APIs for Google Maps, YouTube, jQuery Mobile, Twitter, and Facebook. While this is not a beginner's guide to programming, you should have no problem following along if you've spent some time developing with PHP and MySQL.

LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover):... LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover)
Hossam Fattah
R3,568 Discovery Miles 35 680 Ships in 12 - 17 working days

NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance, such as: increased area coverage of up to one kilometer; a massive number of devices-up to 200,000-per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal, such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book, covering many use cases and scenarios, this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino (TM), Amazon Cloud, Google Maps, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules, policy, security certificates, and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols, such as TCP, HTTP, SSL, or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects, such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices, such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators, such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, and electronics enthusiasts. To download the software which can be used with the book, go to: https://github.com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada in 2000. He completed his B.Sc. degree in Computers and Systems Engineering from Al-Azhar University, Cairo, Egypt in 1995. Between 2003 and 2011, he was in academia and industry, including Texas A&M University. Between 2011 and 2013, he was with Spirent Communications, NJ, USA. Since 2013, he has been with Microsoft, USA. He is also an affiliate associate professor at University of Washington, Tacoma, WA, USA, teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers, British Columbia, Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols, cellular quality of service, radio resource management, traffic and packet scheduling, network analytics, and mobility.

Networked Anthropology - A Primer for Ethnographers (Hardcover): Samuel Gerald Collins, Matthew Slover Durington Networked Anthropology - A Primer for Ethnographers (Hardcover)
Samuel Gerald Collins, Matthew Slover Durington
R4,130 Discovery Miles 41 300 Ships in 12 - 17 working days

The advent of social media offers anthropologists exciting opportunities to extend their research to communities in fresh ways. At the same time, these technological developments open up anthropological fieldwork to different hazards. Networked Anthropology explores the increasing appropriation of diverse media platforms and social media into anthropological research and teaching. The chapters consider the possibilities and challenges of multimedia, how network ecologies work, the ethical dilemmas involved, and how to use multimedia methodologies. The book combines theoretical insights with case studies, methodological sketches and pedagogical notes. Drawing on recent ethnographic work, the authors provide practical guidance in creative ways of doing networked anthropology. They point to the future of ethnography, both inside and outside the classroom, and consider ways in which networked anthropology might develop.

CompTIA CySA+ Study Guide - Exam CS0-001 (Paperback): Mike Chapple, David Seidl CompTIA CySA+ Study Guide - Exam CS0-001 (Paperback)
Mike Chapple, David Seidl
R1,505 R1,090 Discovery Miles 10 900 Save R415 (28%) Out of stock

Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal of securing and protecting organizations systems. Focus your review for the CSA+ with Sybex and benefit from real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions help you gauge your understanding each step of the way. You also gain access to the Sybex interactive learning environment that includes electronic flashcards, a searchable glossary, and hundreds of bonus practice questions. This study guide provides the guidance and knowledge you need to demonstrate your skill set in cybersecurity. Key exam topics include: * Threat management * Vulnerability management * Cyber incident response * Security architecture and toolsets

Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Hardcover): Zoran S. Bojkovic, Bojan M.... Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Hardcover)
Zoran S. Bojkovic, Bojan M. Bakmaz, K.R. Rao
R7,606 Discovery Miles 76 060 Ships in 12 - 17 working days

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.

To the Cloud - Big Data in a Turbulent World (Hardcover): Vincent Mosco To the Cloud - Big Data in a Turbulent World (Hardcover)
Vincent Mosco
R5,337 Discovery Miles 53 370 Ships in 12 - 17 working days

In the wake of revelations about National Security Agency activities many of which occur in the cloud this book offers both enlightenment and a critical view. Cloud computing and big data are arguably the most significant forces in information technology today. In clear prose, To the Cloud explores where the cloud originated, what it means, and how important it is for business, government, and citizens. It describes the intense competition among cloud companies like Amazon and Google, the spread of the cloud to government agencies like the controversial NSA, and the astounding growth of entire cloud cities in China. From advertising to trade shows, the cloud and big data are furiously marketed to the world, even as dark clouds loom over environmental, privacy, and employment issues that arise from the cloud. Is the cloud the long-promised information utility that will solve many of the world s economic and social problems? Or is it just marketing hype? To the Cloud provides the first thorough analysis of the potential and the problems of a technology that may very well disrupt the world.

PCI Compliance - The Definitive Guide (Hardcover): Abhay Bhargav PCI Compliance - The Definitive Guide (Hardcover)
Abhay Bhargav
R3,715 Discovery Miles 37 150 Ships in 12 - 17 working days

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (PCI) security standards in a manner that is easy to understand.
This step-by-step guidebook delves into PCI standards from an implementation standpoint. It begins with a basic introduction to PCI compliance, including its history and evolution. It then thoroughly and methodically examines the specific requirements of PCI compliance. PCI requirements are presented along with notes and assessment techniques for auditors and assessors.
The text outlines application development and implementation strategies for Payment Application Data Security Standard (PA-DSS) implementation and validation. Explaining the PCI standards from an implementation standpoint, it clarifies the intent of the standards on key issues and challenges that entities must overcome in their quest to meet compliance requirements.
The book goes beyond detailing the requirements of the PCI standards to delve into the multiple implementation strategies available for achieving PCI compliance. The book includes a special appendix on the recently released PCI-DSS v 3.0. It also contains case studies from a variety of industries undergoing compliance, including banking, retail, outsourcing, software development, and processors. Outlining solutions extracted from successful real-world PCI implementations, the book ends with a discussion of PA-DSS standards and validation requirements.

Distributed Systems - An Algorithmic Approach, Second Edition (Paperback, 2nd edition): Sukumar Ghosh Distributed Systems - An Algorithmic Approach, Second Edition (Paperback, 2nd edition)
Sukumar Ghosh
R1,308 Discovery Miles 13 080 Ships in 12 - 17 working days

Distributed Systems: An Algorithmic Approach, Second Edition provides a balanced and straightforward treatment of the underlying theory and practical applications of distributed computing. As in the previous version, the language is kept as unobscured as possible-clarity is given priority over mathematical formalism. This easily digestible text: Features significant updates that mirror the phenomenal growth of distributed systems Explores new topics related to peer-to-peer and social networks Includes fresh exercises, examples, and case studies Supplying a solid understanding of the key principles of distributed computing and their relationship to real-world applications, Distributed Systems: An Algorithmic Approach, Second Edition makes both an ideal textbook and a handy professional reference.

Handbook of Image-Based Security Techniques (Paperback): Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri Handbook of Image-Based Security Techniques (Paperback)
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
R1,590 Discovery Miles 15 900 Ships in 12 - 17 working days

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB

GPU Parallel Program Development Using CUDA (Paperback): Tolga Soyata GPU Parallel Program Development Using CUDA (Paperback)
Tolga Soyata
R1,477 Discovery Miles 14 770 Ships in 12 - 17 working days

GPU Parallel Program Development using CUDA teaches GPU programming by showing the differences among different families of GPUs. This approach prepares the reader for the next generation and future generations of GPUs. The book emphasizes concepts that will remain relevant for a long time, rather than concepts that are platform-specific. At the same time, the book also provides platform-dependent explanations that are as valuable as generalized GPU concepts. The book consists of three separate parts; it starts by explaining parallelism using CPU multi-threading in Part I. A few simple programs are used to demonstrate the concept of dividing a large task into multiple parallel sub-tasks and mapping them to CPU threads. Multiple ways of parallelizing the same task are analyzed and their pros/cons are studied in terms of both core and memory operation. Part II of the book introduces GPU massive parallelism. The same programs are parallelized on multiple Nvidia GPU platforms and the same performance analysis is repeated. Because the core and memory structures of CPUs and GPUs are different, the results differ in interesting ways. The end goal is to make programmers aware of all the good ideas, as well as the bad ideas, so readers can apply the good ideas and avoid the bad ideas in their own programs. Part III of the book provides pointer for readers who want to expand their horizons. It provides a brief introduction to popular CUDA libraries (such as cuBLAS, cuFFT, NPP, and Thrust),the OpenCL programming language, an overview of GPU programming using other programming languages and API libraries (such as Python, OpenCV, OpenGL, and Apple's Swift and Metal,) and the deep learning library cuDNN.

Internet of Things - Challenges, Advances, and Applications (Paperback): Qusay F. Hassan, Atta-Ur-Rehman Khan, Sajjad A. Madani Internet of Things - Challenges, Advances, and Applications (Paperback)
Qusay F. Hassan, Atta-Ur-Rehman Khan, Sajjad A. Madani
R1,467 Discovery Miles 14 670 Ships in 12 - 17 working days

Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it provides detailed discussion of the utilization of IoT and its underlying technologies in critical application areas, such as smart grids, healthcare, insurance, and the automotive industry. The chapters of this book are authored by several international researchers and industry experts. This book is composed of 18 self-contained chapters that can be read, based on interest. Features: Introduces IoT, including its history, common definitions, underlying technologies, and challenges Discusses technological advances in IoT and implementation considerations Proposes novel solutions for common implementation issues Explores critical application domains, including large-scale electric power distribution networks, smart water and gas grids, healthcare and e-Health applications, and the insurance and automotive industries The book is an excellent reference for researchers and post-graduate students working in the area of IoT, or related areas. It also targets IT professionals interested in gaining deeper knowledge of IoT, its challenges, and application areas.

Mobile SmartLife via Sensing, Localization, and Cloud Ecosystems (Paperback): Kaikai Liu, Xiaolin Li Mobile SmartLife via Sensing, Localization, and Cloud Ecosystems (Paperback)
Kaikai Liu, Xiaolin Li
R1,451 Discovery Miles 14 510 Ships in 12 - 17 working days

Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source prototype systems. The tutorial and sample code are provided as a good reference and starting point for readers who are interested in the technique detail.

Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback): Sinjini Mitra, Mikhail Gofman Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback)
Sinjini Mitra, Mikhail Gofman
R1,474 Discovery Miles 14 740 Ships in 12 - 17 working days

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Prayers to Move Your Mountains
Michael Klassen, Thomas Freiling Paperback R467 R391 Discovery Miles 3 910
The Wonderful Name of Jesus
E.W. Kenyon Paperback R422 R338 Discovery Miles 3 380
Intimate Intercession
Tricia McCary Rhodes Paperback R346 R259 Discovery Miles 2 590
Hearing from God - 5 Steps to Knowing…
David Stine Paperback R445 R373 Discovery Miles 3 730
Forgiveness, the Passionate Journey…
Flora Slosson Wuellner Paperback R357 R298 Discovery Miles 2 980
21 Days of Deeper Prayer - Discover an…
Jim Maxim, Daniel Henderson Paperback R210 R173 Discovery Miles 1 730
Acts of Faith - 25th Anniversary Edition
Iyanla Vanzant Paperback  (1)
R507 R427 Discovery Miles 4 270
The Better Part: Four Volume Set
John Bartunek Paperback R1,339 Discovery Miles 13 390
Praying - Finding Our Way From Duty To…
J I Packer Carolyn Nystrom Paperback R356 R319 Discovery Miles 3 190
Your Humble Prayee
Carl Clark Paperback R276 R224 Discovery Miles 2 240

 

Partners