0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R3,034 Discovery Miles 30 340 Ships in 10 - 15 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Digital Watermarking and Steganography (Hardcover, 2nd edition): Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich,... Digital Watermarking and Steganography (Hardcover, 2nd edition)
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker
R2,238 Discovery Miles 22 380 Ships in 12 - 19 working days

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications

Software Defined Networks - A Comprehensive Approach (Paperback): Paul Goransson, Chuck Black Software Defined Networks - A Comprehensive Approach (Paperback)
Paul Goransson, Chuck Black
R1,102 Discovery Miles 11 020 Ships in 12 - 19 working days

"Software Defined Networks" discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN modelHow to make intelligent decisions about when to integrate SDN technologies in a networkHow to decide if your organization should be developing its own SDN applications or looking to acquire these from an outside vendorHow to accelerate the ability to develop your own SDN application, be it entirely novel or a more efficient approach to a long-standing problem
Discusses the evolution of the switch platforms that enable SDN Addresses when to integrate SDN technologies in a networkProvides an overview of sample SDN applications relevant to different industriesIncludes practical examples of how to write SDN applications

Introduction to Modern Sleep Technology (Hardcover, 2012 ed.): Rayleigh Ping-Ying Chiang, Shih-Chun Kang Introduction to Modern Sleep Technology (Hardcover, 2012 ed.)
Rayleigh Ping-Ying Chiang, Shih-Chun Kang
R2,916 Discovery Miles 29 160 Ships in 10 - 15 working days

Sleep medicine has been developing for more than 40 years. The current concepts in sleep technology are mainly centered on polysomnography (PSG) and issues related to sleep technicians. However, the editorsbelieve that the true value of technology is revealed only when benefits to humanity are manifest. To this end, they endeavor to create a new era in sleep technology, one that will improve the quality of people's sleep and daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Digital Design (VHDL) - An Embedded Systems Approach Using VHDL (Paperback): Peter J Ashenden Digital Design (VHDL) - An Embedded Systems Approach Using VHDL (Paperback)
Peter J Ashenden
R2,291 Discovery Miles 22 910 Ships in 12 - 19 working days

"Digital Design: An Embedded Systems Approach Using VHDL" provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It takes an up-to-date and modern approach of presenting digital logic design as an activity in a larger systems design context.
Rather than focus on aspects of digital design that have little relevance in a realistic design context, this book concentrates on modern and evolving knowledge and design skills. Hardware description language (HDL)-based design and verification is emphasized--VHDL examples are used extensively throughout. By treating digital logic as part of embedded systems design, this book provides an understanding of the hardware needed in the analysis and design of systems comprising both hardware and software components.
Includes a Web site with links to vendor tools, labs and tutorials.
Presents digital logic design as an activity in a larger systems design context.
Features extensive use of VHDL examples to demonstrate HDL (hardware description language) usage at the abstract behavioural level and register transfer level, as well as for low-level verification and verification environments.
Includes worked examples throughout to enhance the reader's understanding and retention of the material.
Companion Web site includes links to tools for FPGA design from Synplicity, Mentor Graphics, and Xilinx, VHDL source code for all the examples in the book, lecture slides, laboratory projects, and solutions to exercises."

Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach (Hardcover, 1st ed. 2018): Michel Raynal Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach (Hardcover, 1st ed. 2018)
Michel Raynal
R2,346 Discovery Miles 23 460 Ships in 10 - 15 working days

This book presents the most important fault-tolerant distributed programming abstractions and their associated distributed algorithms, in particular in terms of reliable communication and agreement, which lie at the heart of nearly all distributed applications. These programming abstractions, distributed objects or services, allow software designers and programmers to cope with asynchrony and the most important types of failures such as process crashes, message losses, and malicious behaviors of computing entities, widely known under the term "Byzantine fault-tolerance". The author introduces these notions in an incremental manner, starting from a clear specification, followed by algorithms which are first described intuitively and then proved correct. The book also presents impossibility results in classic distributed computing models, along with strategies, mainly failure detectors and randomization, that allow us to enrich these models. In this sense, the book constitutes an introduction to the science of distributed computing, with applications in all domains of distributed systems, such as cloud computing and blockchains. Each chapter comes with exercises and bibliographic notes to help the reader approach, understand, and master the fascinating field of fault-tolerant distributed computing.

Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008): Slawomir Stanczak,... Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008)
Slawomir Stanczak, Marcin Wiczanowski, Holger Boche
R3,136 Discovery Miles 31 360 Ships in 10 - 15 working days

The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.

Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.): Joyce... Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.)
Joyce Westerink, Martin Ouwerkerk, Therese J. M. Overbeek, W. Frank Pasveer
R2,895 Discovery Miles 28 950 Ships in 10 - 15 working days

This book adheres to the vision that in the future compelling user experiences will be key differentiating benefits of products and services. Evaluating the user experience plays a central role, not only during the design process, but also during regular usage: for instance a video recorder that recommends TV programs that fit your current mood, a product that measures your current level of relaxation and produces advice on how to balance your life, or a module that alerts a factory operator when he is getting drowsy. Such systems are required to assess and interpret user experiences (almost) in real-time, and that is exactly what this book is about. How to achieve this? What are potential applications of psychophysiological measurements? Are real-time assessments based on monitoring of user behavior possible? If so, which elements are critical? Are behavioral aspects important? Which technology can be used? How important are intra-individual differences? What can we learn from products already on the market? The book gathers a group of invited authors from different backgrounds, such as technology, academy and business. This is a mosaic of their work, and that of Philips Research, in the assessment of user experience, covering the full range from academic research to commercial propositions..

Trustworthy Ubiquitous Computing (English, Bosnian, Hardcover, 2012 ed.): Ismail Khalil, Teddy Mantoro Trustworthy Ubiquitous Computing (English, Bosnian, Hardcover, 2012 ed.)
Ismail Khalil, Teddy Mantoro
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to "emerged and exciting new computing paradigm of Ubiquitous Computing", includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Marc Weiser presented his vision of disappearing and ubiquitous computing more than 15 years ago. The big picture of the computer introduced into our environment was a big innovation and the starting point for various areas of research. In order to totally adopt the idea of ubiquitous computing several houses were build, equipped with technology and used as laboratory in order to find and test appliances that are useful and could be made available in our everyday life. Within the last years industry picked up the idea of integrating ubiquitous computing and already available products like remote controls for your house were developed and brought to the market. In spite of many applications and projects in the area of ubiquitous and pervasive computing the success is still far away. One of the main reasons is the lack of acceptance of and confidence in this technology. Although researchers and industry are working in all of these areas a forum to elaborate security, reliability and privacy issues, that resolve in trustworthy interfaces and computing environments for people interacting within these ubiquitous environments is important. The user experience factor of trust thus becomes a crucial issue for the success of a UbiComp application. The goal of this book is to provide a state the art of Trustworthy Ubiquitous Computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues.

Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019): Aboul... Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny
R4,142 Discovery Miles 41 420 Ships in 10 - 15 working days

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.

Wireless Communications & Networking (Hardcover): Vijay Garg Wireless Communications & Networking (Hardcover)
Vijay Garg
R2,344 Discovery Miles 23 440 Ships in 12 - 19 working days

This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN).
The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.)
After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems.
A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts.
Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students.
*Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN)
*Comprehensive and up-to-date coverage including the latest in standards and 4G technology
*Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available

Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.): Shafiullah Khan, Al-Sakib Khan... Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.)
Shafiullah Khan, Al-Sakib Khan Pathan
R6,448 R5,238 Discovery Miles 52 380 Save R1,210 (19%) Ships in 12 - 19 working days

"Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.

Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca,... Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 (Hardcover, 2008 ed.)
Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
R2,889 Discovery Miles 28 890 Ships in 10 - 15 working days

This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. Aside the adoption of Internet as the global network infrastructure these last years have shown the growing of a set of new network architectures without a rigid and known a priori architecture using wireless techniques, like sensor and ad-hoc networks. These new types of networks are opening the possibility to create a large number of new applications ranging from domestic to nature surveying. These new networks are generating new technical challenges like the capability of auto-reconfiguration in order to give the network an optimal configuration, the energy saving need when the nodes have not a source of energy other than a small battery, new protocols to access the network and to convey the information across the network when its structure is not completely known or should be discovered, new paradigms for keeping the needed information security and privacy in a quite uncontrolled environment, and others.

Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm - Trends, Advances, and Future Prospects (Hardcover, 1st ed.... Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm - Trends, Advances, and Future Prospects (Hardcover, 1st ed. 2020)
Pawel Sniatala, M. Hadi Amini, Kianoosh G. Boroojeni
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios. This book celebrates S.S. Iyengar's accomplishments that led to his 2019 Institute of Electrical and Electronics Engineers' (IEEE) Cybermatics Congress "Test of Time Award" for his work on creating Brooks-Iyengar Algorithm and its impact in advancing modern computing.

Smart Device to Smart Device Communication (Hardcover, 2014): Shahid Mumtaz, Jonathan Rodriguez Smart Device to Smart Device Communication (Hardcover, 2014)
Shahid Mumtaz, Jonathan Rodriguez
R3,636 Discovery Miles 36 360 Ships in 12 - 19 working days

This book presents a comprehensive analysis of D2D communication over LTE-A band. The book uses 3GPP LTE-A as a baseline and explains all fundamental requirements for deploying D2D network under cellular systems from an architectural, technical and business point of view. The contributors explain the standardization activities of Release 12 of LTE-A, which has been recently acknowledged as support of D2D communication in LTE-A. The text updates the research community on the D2D roadmap as well as new features emerging for consideration in 3GPP.

Amazon Elastic Compute Cloud User Guide for Windows Instances (Hardcover): Documentation Team Amazon Elastic Compute Cloud User Guide for Windows Instances (Hardcover)
Documentation Team
R3,145 Discovery Miles 31 450 Ships in 10 - 15 working days
Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011): Ling Dong, Kefei Chen Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011)
Ling Dong, Kefei Chen
R4,942 Discovery Miles 49 420 Ships in 12 - 19 working days

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism s efficiency, rigorousness, and the possibility of its automation are also presented.
The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.
Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.

Cyberterrorism - Understanding, Assessment, and Response (Hardcover, 2014 ed.): Thomas M. Chen, Lee Jarvis, Stuart MacDonald Cyberterrorism - Understanding, Assessment, and Response (Hardcover, 2014 ed.)
Thomas M. Chen, Lee Jarvis, Stuart MacDonald
R3,202 Discovery Miles 32 020 Ships in 12 - 19 working days

This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.

Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,589 Discovery Miles 45 890 Ships in 12 - 19 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.): Nikolaos P. Preve Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.)
Nikolaos P. Preve
R4,388 Discovery Miles 43 880 Ships in 10 - 15 working days

This book presents research from many of the major projects involved in the emerging global grid infrastructure. With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs. Topics: examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures; describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks; investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems; explores job control using service-level agreements; introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix; discusses the PhyloGrid application, and a numerical simulation performed using grid computing.

Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS... Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS 2009, Langenargen, Germany, September 14-16, 2009, Proceedings (Hardcover, 2009 ed.)
Achim Rettberg, Mauro C. Zanella, Michael Amann, Michael Keckeisen, Franz J. Rammig
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

This book presents the technical program of the International Embedded Systems Symposium (IESS) 2009. Timely topics, techniques and trends in embedded system design are covered by the chapters in this volume, including modelling, simulation, verification, test, scheduling, platforms and processors. Particular emphasis is paid to automotive systems and wireless sensor networks. Sets of actual case studies in the area of embedded system design are also included. Over recent years, embedded systems have gained an enormous amount of proce- ing power and functionality and now enter numerous application areas, due to the fact that many of the formerly external components can now be integrated into a single System-on-Chip. This tendency has resulted in a dramatic reduction in the size and cost of embedded systems. As a unique technology, the design of embedded systems is an essential element of many innovations. Embedded systems meet their performance goals, including real-time constraints, through a combination of special-purpose hardware and software components tailored to the system requirements. Both the development of new features and the reuse of existing intellectual property components are essential to keeping up with ever more demanding customer requirements. Furthermore, design complexities are steadily growing with an increasing number of components that have to cooperate properly. Embedded system designers have to cope with multiple goals and constraints simul- neously, including timing, power, reliability, dependability, maintenance, packaging and, last but not least, price.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R986 R848 Discovery Miles 8 480 Save R138 (14%) Ships in 10 - 15 working days
Deploying IP and MPLS QoS for Multiservice Networks - Theory and Practice (Hardcover): John William Evans, Clarence Filsfils Deploying IP and MPLS QoS for Multiservice Networks - Theory and Practice (Hardcover)
John William Evans, Clarence Filsfils
R1,514 Discovery Miles 15 140 Ships in 12 - 19 working days

QoS, short for "quality of service," is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional.
The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations.
*Helps readers understand concepts of IP QoS by presenting clear descriptions of QoS components, architectures, and protocols
*Directs readers in the design and deployment of IP QoS networks through fully explained examples of actual working designs
*Contains real life case studies which focus on implementation

Smart Grids: Security and Privacy Issues (Hardcover, 1st ed. 2017): Kianoosh G. Boroojeni, M. Hadi Amini, S.S. Iyengar Smart Grids: Security and Privacy Issues (Hardcover, 1st ed. 2017)
Kianoosh G. Boroojeni, M. Hadi Amini, S.S. Iyengar
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.

Partitional Clustering Algorithms (Hardcover, 2015 ed.): M. Emre Celebi Partitional Clustering Algorithms (Hardcover, 2015 ed.)
M. Emre Celebi
R4,390 R3,820 Discovery Miles 38 200 Save R570 (13%) Ships in 12 - 19 working days

This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Quantitative Data Analysis - A Companion…
Willem Mertens, Amedeo Pugliese, … Hardcover R2,957 Discovery Miles 29 570
R Visualizations - Derive Meaning from…
David Gerbing Paperback R1,418 Discovery Miles 14 180
Oceanographic Analysis with R
Dan E. Kelley Hardcover R2,188 Discovery Miles 21 880
Handbook of Research on Fuzzy and Rough…
Arun Kumar Sangaiah, Xiao-Zhi Gao, … Hardcover R7,497 Discovery Miles 74 970
R Visualizations - Derive Meaning from…
David Gerbing Hardcover R2,607 Discovery Miles 26 070
Linear Algebra with Mathematica - An…
Fred Szabo Paperback R2,175 Discovery Miles 21 750
Information and Communications…
David Tinsley, David B. Johnson Hardcover R3,056 Discovery Miles 30 560
Advancements in Applied Metaheuristic…
Nilanjan Dey Hardcover R6,050 Discovery Miles 60 500
Mathematical Methods for Mechanics - A…
Eckart W. Gekeler Hardcover R4,480 Discovery Miles 44 800
Statistical Trend Analysis of Physically…
Behrouz Zolfaghari, Khodakhast Bibak, … Hardcover R1,605 Discovery Miles 16 050

 

Partners