0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (274)
  • R250 - R500 (877)
  • R500+ (13,584)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2018 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2018 (Hardcover, 1st ed. 2020)
Ping Zheng, Vic Callaghan, David Crawford, Tiina Kymalainen, Angelica Reyes-Munoz
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

This book presents the proceedings of the 2nd EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE' 2018), which took place at Ravensbourne University London, London, UK, on September 4, 2018. The central theme of the conference is emerging technologies in relation to business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New): Massimo Villari, Ivona... Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New)
Massimo Villari, Ivona Brandic, Francesco Tusa
R4,758 Discovery Miles 47 580 Ships in 18 - 22 working days

Cloud computing presents a promising approach for implementing scalable information and communications technology systems for private and public, individual, community, and business use. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice overviews current developments in cloud computing concepts, architectures, infrastructures and methods, focusing on the needs of small to medium enterprises. The topic of cloud computing is addressed on two levels: the fundamentals of cloud computing and its impact on the IT world; and an analysis of the main issues regarding the cloud federation, autonomic resource management, and efficient market mechanisms, while supplying an overview of the existing solutions able to solve them. This publication is aimed at both enterprise business managers and research and academic audiences alike.

Conductor: Distributed Adaptation for Heterogeneous Networks (Hardcover, 2002 ed.): Mark D. Yarvis, Peter Reiher, Gerald J.... Conductor: Distributed Adaptation for Heterogeneous Networks (Hardcover, 2002 ed.)
Mark D. Yarvis, Peter Reiher, Gerald J. Popek
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

Internet heterogeneity is driving a new challenge in application development: adaptive software. Together with the increased Internet capacity and new access technologies, network congestion and the use of older technologies, wireless access, and peer-to-peer networking are increasing the heterogeneity of the Internet. Applications should provide gracefully degraded levels of service when network conditions are poor, and enhanced services when network conditions exceed expectations. Existing adaptive technologies, which are primarily end-to-end or proxy-based and often focus on a single deficient link, can perform poorly in heterogeneous networks. Instead, heterogeneous networks frequently require multiple, coordinated, and distributed remedial actions. Conductor: Distributed Adaptation for Heterogeneous Networks describes a new approach to graceful degradation in the face of network heterogeneity - distributed adaptation - in which adaptive code is deployed at multiple points within a network. The feasibility of this approach is demonstrated by conductor, a middleware framework that enables distributed adaptation of connection-oriented, application-level protocols. By adapting protocols, conductor provides application-transparent adaptation, supporting both existing applications and applications designed with adaptation in mind. Conductor: Distributed Adaptation for Heterogeneous Networks introduces new techniques that enable distributed adaptation, making it automatic, reliable, and secure. In particular, we introduce the notion of semantic segmentation, which maintains exactly-once delivery of the semantic elements of a data stream while allowing the stream to be arbitrarily adapted in transit. We also introduce a secure architecture for automatic adaptor selection, protecting user data from unauthorized adaptation. These techniques are described both in the context of conductor and in the broader context of distributed systems. Finally, this book presents empirical evidence from several case studies indicating that distributed adaptation can allow applications to degrade gracefully in heterogeneous networks, providing a higher quality of service to users than other adaptive techniques. Further, experimental results indicate that the proposed techniques can be employed without excessive cost. Thus, distributed adaptation is both practical and beneficial. Conductor: Distributed Adaptation for Heterogeneous Networks is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science.

Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

Ten Laws for Security (Hardcover, 1st ed. 2016): Eric Diehl Ten Laws for Security (Hardcover, 1st ed. 2016)
Eric Diehl
R2,438 Discovery Miles 24 380 Ships in 10 - 15 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Microsoft 365 Administration Inside Out (Paperback, 3rd edition): Aaron Guilmette, Darryl Kegg, Ed Fisher Microsoft 365 Administration Inside Out (Paperback, 3rd edition)
Aaron Guilmette, Darryl Kegg, Ed Fisher
R1,072 Discovery Miles 10 720 Ships in 10 - 15 working days

Conquer Microsoft 365 administration, from the inside out! Dive into Microsoft 365 administration and harness the full power of cloud scaling, automation, and availability in Microsoft 365! This supremely well-organized reference packs hundreds of time-saving solutions, tips, and workarounds; all you need to continually enhance organizational agility, productivity, and security. Three Microsoft insiders help you fully leverage Microsoft Purview, Microsoft Enterprise Mobility + Security (EMS), Azure AD, Exchange Online, Microsoft Teams, SharePoint Online, OneDrive for Business, and more. Discover how experts tackle today's key tasks and challenge yourself to new levels of mastery. Plan deployment, understand downstream impacts, and avoid pitfalls Prepare your environment, establish governance, and enforce compliance Assess and improve security posture with Microsoft 365 Secure Score Move to identity-based security with Microsoft Enterprise Mobility + Security (EMS) Plan identity types, authentication, identity federation, and AAD Connect deployment Replace costly premises infrastructure with cloud-based Azure synchronization Manage complex Azure AD scenarios such as mergers, acquisitions, and divestitures Automate Azure to improve consistency, security, and standardization Prepare for Exchange Online cloud-only deployments, hybrid coexistence, and migration Move mailboxes and public folders to Exchange Online Understand Microsoft Teams concepts, architecture, and user interface Support meetings, webinars, and live events Deliver full-featured telephony solutions with Teams Phone System Implement telephony scheduling, room collaboration, automation, and IVR Use SharePoint Online to manage content and extend it with analytics and dashboards   For IT Professionals and Consultants Your role: You have, or will have, responsibilities for deploying, migrating to, or managing some or all of a Microsoft 365 environment Prerequisites: For individuals at any stage of their cloud journey

Fibre Channel - Connection To The Future (Hardcover, 2nd edition): Fibrechannelindustryassoc Fibre Channel - Connection To The Future (Hardcover, 2nd edition)
Fibrechannelindustryassoc
R753 Discovery Miles 7 530 Ships in 10 - 15 working days

The Fibre Channel Association is an international organization devoted to educating and promoting the Fibre Channel standard.
.A thorough introduction to the Fibre Channel standard, including structures, features, and terminology
.Discusses typical applications for Fibre Channel
"

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,020 Discovery Miles 60 200 Ships in 18 - 22 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Cable Engineering for Local Area Networks (Hardcover): B.J. Elliott Cable Engineering for Local Area Networks (Hardcover)
B.J. Elliott
R3,208 Discovery Miles 32 080 Ships in 10 - 15 working days

This book provides a complete guide to the design, procurement, installation and testing procedures for local area networks (LANs) using both copper and optical fibre cable technology. International, European and American LAN and premises cabling standards are explained and compared including the latest Category 5, Category 6 and Category 7 proposals. The latest standards in testing, electromagnetic compatibility (EMC) compliance and fire safety are also covered in detail.
By describing the theory as well as the practical issues involved, this book is an unrivalled source of information for those who need to understand, at a time of very rapid change, the complexities of today's office-based LANs.
British courses such as City and Guilds course 3466, Copper and Optical Communications
C & G courses in Telecommunications and Electronics Engineering 2720, 2760 and 3478
NVQ and SNVQ courses on copper and fibre communications technology, levels one to five
Future qualifications to be developed by the European Institute of Telecommunications Engineering and the European Intelligent buildings group
American Certified Electronics Technician, Certified Fiber Optics Installer, Certified Network Systems Technician and Telecommunications Electronics Technician courses
BICSI courses such as RCDD where the book's coverage of European and international standards is very useful
BTEC and BSc courses on electronic and communications engineering
In addition it is a valuable resource for IT managers, consultants, cable installation engineers and system designers who need to understand the technology and physics behind the subject and the huge range of standards that apply to cable engineering

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Multirate Systems - Design and Application (Hardcover, illustrated edition): Multirate Systems - Design and Application (Hardcover, illustrated edition)
R1,999 Discovery Miles 19 990 Ships in 18 - 22 working days

Digital signal processing is an area of science and engineering that has been developed rapidly over the past years. This rapid development is the result of the significant advances in digital computer technology and integrated circuits fabrication. Many of the signal processing tasks conventionally performed by analog means, are realized today by less expensive and often more reliable digital hardware. Multirate Systems: Design and Applications addresses the rapid development of multirate digital signal processing and how it is complemented by the emergence of new applications.

Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover): Chetna Singhal, Swades De Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover)
Chetna Singhal, Swades De
R4,823 Discovery Miles 48 230 Ships in 18 - 22 working days

With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research on upcoming 5G technologies for next generation mobile networks, examining the various features, solutions, and challenges associated with such advances. Highlighting relevant coverage across topics such as energy efficiency, user support, and adaptive multimedia services, this book is ideally designed for academics, professionals, graduate students, and professionals interested in novel research for wireless innovations.

Data Network Engineering (Hardcover, 1999 ed.): Tim King, Dave Newson Data Network Engineering (Hardcover, 1999 ed.)
Tim King, Dave Newson
R4,201 Discovery Miles 42 010 Ships in 18 - 22 working days

It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,522 R2,415 Discovery Miles 24 150 Save R1,107 (31%) Ships in 10 - 15 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

Technological Advancements and the Impact of Actor-Network Theory (Hardcover): Arthur Tatnall Technological Advancements and the Impact of Actor-Network Theory (Hardcover)
Arthur Tatnall
R4,801 Discovery Miles 48 010 Ships in 18 - 22 working days

Actor-Network Theory (ANT) has existed as a topic of interest among social theorists for decades. Due to the prevalence of technology in modern society, discussions over the influence of actor-network theory on the changing scope of technology can assist in facilitating further research and scientific thought. Technological Advancements and the Impact of Actor-Network Theory focuses on cross-disciplinary research as well as examples of the use of actor-network theory in a variety of fields, including medicine, education, business, engineering, environmental science, computer science, and social science. This timely publication is well-suited for reference use by academicians, researchers, upper-level students, and theorists. Topics Covered The many academic areas covered in this publication include, but are not limited to: Digital Communication E-Health Human Interaction Information and Communication Technologies Online Education Online Investing Public Service Innovation Software Development

Grid and Services Evolution (Hardcover, 2009 ed.): Norbert Meyer, Domenico Talia, Ramin Yahyapour Grid and Services Evolution (Hardcover, 2009 ed.)
Norbert Meyer, Domenico Talia, Ramin Yahyapour
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain, June 5-6, 2008.

Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments.

Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,031 R2,746 Discovery Miles 27 460 Save R285 (9%) Ships in 18 - 22 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,473 Discovery Miles 64 730 Ships in 10 - 15 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,424 R1,924 Discovery Miles 19 240 Save R1,500 (44%) Ships in 10 - 15 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R786 Discovery Miles 7 860 Ships in 18 - 22 working days
Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International... Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International Workshop on Protocols for High-Speed Networks (PfHSN '99) August 25-27, 1999, Salem, Massachusetts, USA (Hardcover, 2000 ed.)
Joseph D. Touch, James P.G. Sterbenz
R5,300 Discovery Miles 53 000 Ships in 18 - 22 working days

1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia Antipolis I Nice (1996- the Mediterranean Sea). PfHSN is a workshop providing an international forum for the exchange of information on high-speed networks. It is a relatively small workshop, limited to 80 participants or less, to encourage lively discussion and the active participation of all attendees. A significant component of the workshop is interactive in nature, with a long history of significant time reserved for discussions. This was enhanced in 1996 by Christophe Diot and W allid Dabbous with the institution of Working Sessions chaired by an "animator," who is a distinguished researcher focusing on topical issues of the day. These sessions are an audience participation event, and are one of the things that makes PfHSN a true "working conference."

Amazon CloudSearch Developer Guide (Hardcover): Documentation Team Amazon CloudSearch Developer Guide (Hardcover)
Documentation Team
R1,721 Discovery Miles 17 210 Ships in 18 - 22 working days
Cloud Computing: A Futuristic Approach (Hardcover): Amanda Wegener Cloud Computing: A Futuristic Approach (Hardcover)
Amanda Wegener
R3,233 R2,928 Discovery Miles 29 280 Save R305 (9%) Ships in 18 - 22 working days
Intelligent Multimedia Data Analysis (Hardcover): Siddhartha Bhattacharyya, Indrajit Pan, Abhijit Das, Shibakali Gupta Intelligent Multimedia Data Analysis (Hardcover)
Siddhartha Bhattacharyya, Indrajit Pan, Abhijit Das, Shibakali Gupta; Contributions by Dibya Jyoti Bora, …
R3,633 Discovery Miles 36 330 Ships in 10 - 15 working days

This volume comprises eight well-versed contributed chapters devoted to report the latest findings on the intelligent approaches to multimedia data analysis. Multimedia data is a combination of different discrete and continuous content forms like text, audio, images, videos, animations and interactional data. At least a single continuous media in the transmitted information generates multimedia information. Due to these different types of varieties, multimedia data present varied degrees of uncertainties and imprecision, which cannot be easy to deal by the conventional computing paradigm. Soft computing technologies are quite efficient to handle the imprecision and uncertainty of the multimedia data and they are flexible enough to process the real-world information. Proper analysis of multimedia data finds wide applications in medical diagnosis, video surveillance, text annotation etc. This volume is intended to be used as a reference by undergraduate and post graduate students of the disciplines of computer science, electronics and telecommunication, information science and electrical engineering. THE SERIES: FRONTIERS IN COMPUTATIONAL INTELLIGENCE The series Frontiers In Computational Intelligence is envisioned to provide comprehensive coverage and understanding of cutting edge research in computational intelligence. It intends to augment the scholarly discourse on all topics relating to the advances in artifi cial life and machine learning in the form of metaheuristics, approximate reasoning, and robotics. Latest research fi ndings are coupled with applications to varied domains of engineering and computer sciences. This field is steadily growing especially with the advent of novel machine learning algorithms being applied to different domains of engineering and technology. The series brings together leading researchers that intend to continue to advance the fi eld and create a broad knowledge about the most recent state of the art.

Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and... Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and Networks (CECNet 2015) (Hardcover, 1st ed. 2016)
Amir Hussain
R7,637 R6,451 Discovery Miles 64 510 Save R1,186 (16%) Ships in 10 - 15 working days

This book comprises peer-reviewed contributions presented at the 5th International Conference on Electronics, Communications and Networks (CECNet 2015), held in Shanghai, China, 12-15 December, 2015. It includes new multi-disciplinary topics spanning a unique depth and breadth of cutting-edge research areas in Electronic Engineering, Communications and Networks, and Computer Technology. More generally, it is of interest to academics, students and professionals involved in Consumer Electronics Technology, Communication Engineering and Technology, Wireless Communication Systems and Technology, and Computer Engineering and Technology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners