0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (342)
  • R250 - R500 (892)
  • R500+ (13,970)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Handbook of Vascular Biometrics (Hardcover, 1st ed. 2020): Andreas Uhl, Christoph Busch, Sebastien Marcel, Raymond Veldhuis Handbook of Vascular Biometrics (Hardcover, 1st ed. 2020)
Andreas Uhl, Christoph Busch, Sebastien Marcel, Raymond Veldhuis
R1,648 Discovery Miles 16 480 Ships in 12 - 17 working days

This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.

Wireless Sensor Networks and Ecological Monitoring (Hardcover, 2013 ed.): Subhas C Mukhopadhyay, Joe-Air Jiang Wireless Sensor Networks and Ecological Monitoring (Hardcover, 2013 ed.)
Subhas C Mukhopadhyay, Joe-Air Jiang
R5,554 Discovery Miles 55 540 Ships in 12 - 17 working days

This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.

Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New): Peyman Kabiri Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New)
Peyman Kabiri
R5,361 Discovery Miles 53 610 Ships in 12 - 17 working days

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

Network Control and Engineering for QoS, Security and Mobility, IV - Fourth IFIP International Conference on Network Control... Network Control and Engineering for QoS, Security and Mobility, IV - Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14-18, 2005 (Hardcover, 2007 ed.)
Dominique Gaiti
R3,140 Discovery Miles 31 400 Ships in 10 - 15 working days

This volume contains the proceedings of the Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, NETCON 2005. The conference, organized by the International Federation for Information Processing, was held in Lannion, France from November 14-18, 2005. Coverage explores network security, network policy, quality of service, wireless networks, intelligent networks, and performance evaluation.

Foundations of Computer Security (Hardcover, 2006 ed.): David Salomon Foundations of Computer Security (Hardcover, 2006 ed.)
David Salomon
R1,735 Discovery Miles 17 350 Ships in 12 - 17 working days

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Information Innovation Technology in Smart Cities (Hardcover, 1st ed. 2018): Leila Ismail, Liren Zhang Information Innovation Technology in Smart Cities (Hardcover, 1st ed. 2018)
Leila Ismail, Liren Zhang
R4,958 Discovery Miles 49 580 Ships in 12 - 17 working days

This book describes Smart Cities and the information technologies that will provide better living conditions in the cities of tomorrow. It brings together research findings from 27 countries across the globe, from academia, industry and government. It addresses a number of crucial topics in state of the arts of technologies and solutions related to smart cities, including big data and cloud computing, collaborative platforms, communication infrastructures, smart health, sustainable development and energy management. Information Innovation Technology in Smart Cities is essential reading for researchers working on intelligence and information communication systems, big data, Internet of Things, Cyber Security, and cyber-physical energy systems. It will be also invaluable resource for advanced students exploring these areas.

Network Control and Engineering for QOS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8. Third International... Network Control and Engineering for QOS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8. Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain (Hardcover, 2005 ed.)
Dominique Gaiti, Sebastia Galmes, Ramon Puigjaner
R4,485 Discovery Miles 44 850 Ships in 12 - 17 working days

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and sponsored by the following Working Groups: WG6.2 (Network and Internetwork Architectures), WG6.6 (Management of Networks and Distributed Systems), WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. The adoption of Internet as the global network infrastructure places the issue of quality of service among one of the hot topics nowadays: a huge diversity of applications with quite different service requirements must be supported over a basic core of protocols. Also, the open and uncontrolled nature of Internet enforces the need to guarantee secure transactions among users, thus placing security as another hot topic. Finally, the explosion of mobility and its integration as part of the global infrastructure are probably now the most challenging issues in the networking field.

Harbour Protection Through Data Fusion Technologies (Hardcover, 2009 ed.): Elisa Shahbazian, Galina Rogova, Michael J. DeWeert Harbour Protection Through Data Fusion Technologies (Hardcover, 2009 ed.)
Elisa Shahbazian, Galina Rogova, Michael J. DeWeert
R5,927 Discovery Miles 59 270 Ships in 10 - 15 working days

An Advanced Research Workshop (ARW) "Data Fusion Technologies for Harbour Protection" was held in Tallinn, Estonia 27 June-1 July, 2005. This workshop was organized by request of the NATO Security Through Science Programme and the Defence Investment Division. An ARW is one of many types of funded group support mechanisms established by the NATO Science Committee to contribute to the critical assessment of existing knowledge on new important topics, to identify directions for future research, and to promote close working relationships between scientists from different countries and with different professional experiences. The NATO Science Committee was approved at a meeting of the Heads of Government of the Alliance in December 1957, subsequent to the 1956 recommendation of "Three Wise Men" - Foreign Ministers Lange (Norway), Martino (Italy) and Pearson (Canada) on Non-Military Cooperation in NATO. The NATO Science Committee established the NATO Science Programme in 1958 to encourage and support scientific collaboration between individual scientists and to foster scientific development in its member states. In 1999, following the end of the Cold War, the Science Programme was transformed so that support is now devoted to collaboration between Partner-country and NATO-country scientists or to contributing towards research support in Partner countries. Since 2004, the Science Programme was further modified to focus exclusively on NATO Priority Research Topics (i. e. Defence Against Terrorism or Countering Other Threats to Security) and also preferably on a Partner country priority area.

Cloud Computing Technologies for Connected Government (Hardcover): Zaigham Mahmood Cloud Computing Technologies for Connected Government (Hardcover)
Zaigham Mahmood
R5,369 Discovery Miles 53 690 Ships in 12 - 17 working days

In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.

Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016): George... Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016)
George Christou
R4,403 Discovery Miles 44 030 Ships in 12 - 17 working days

Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R4,142 Discovery Miles 41 420 Ships in 12 - 17 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services... Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services (Paperback)
P Abdoulaye
R717 Discovery Miles 7 170 Ships in 12 - 17 working days

Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.

Cloud Computing in Financial Services (Hardcover): B. Nicoletti Cloud Computing in Financial Services (Hardcover)
B. Nicoletti
R3,394 Discovery Miles 33 940 Ships in 12 - 17 working days

Financial institutions need to increase revenues, decrease cost and be compliant in these difficult times. To meet all these challenges they need to consider disruptive innovations. Cloud computing is one of them. It helps in introducing innovative services, re-engineer processes, improve agility and optimize value. The book analyses in depth the cloud computing model and its current and potential use in financial services. Cloud Computing can change the paradigm of the financial institutions. the word "Bank" comes from the Italian word "Banco," since in the 1300s banking was one on a desk in the streets. The new "banco," the new "desk," will be cloud. Financial institutions must use the model of Cloud Computing for their transformation to a new paradigm.
This book is a blend of academic research, consultancy practice and case studies. It helps in considering opportunities and risks, optimize vendor relationships and organize for the best.

Heterogeneity, High Performance Computing, Self-Organization and the Cloud (Hardcover, 1st ed. 2018): Theo Lynn, John P.... Heterogeneity, High Performance Computing, Self-Organization and the Cloud (Hardcover, 1st ed. 2018)
Theo Lynn, John P. Morrison, David Kenny
R917 Discovery Miles 9 170 Ships in 12 - 17 working days

This book is open access under a CC BY NC ND license. It addresses the most recent developments in cloud computing such as HPC in the Cloud, heterogeneous cloud, self-organising and self-management, and discusses the business implications of cloud computing adoption. Establishing the need for a new architecture for cloud computing, it discusses a novel cloud management and delivery architecture based on the principles of self-organisation and self-management. This focus shifts the deployment and optimisation effort from the consumer to the software stack running on the cloud infrastructure. It also outlines validation challenges and introduces a novel generalised extensible simulation framework to illustrate the effectiveness, performance and scalability of self-organising and self-managing delivery models on hyperscale cloud infrastructures. It concludes with a number of potential use cases for self-organising, self-managing clouds and the impact on those businesses.

Microsoft 365 Administration Inside Out (Paperback, 3rd edition): Aaron Guilmette, Darryl Kegg, Ed Fisher Microsoft 365 Administration Inside Out (Paperback, 3rd edition)
Aaron Guilmette, Darryl Kegg, Ed Fisher
R1,314 R1,094 Discovery Miles 10 940 Save R220 (17%) Ships in 12 - 17 working days

Conquer Microsoft 365 administration, from the inside out! Dive into Microsoft 365 administration and harness the full power of cloud scaling, automation, and availability in Microsoft 365! This supremely well-organized reference packs hundreds of time-saving solutions, tips, and workarounds; all you need to continually enhance organizational agility, productivity, and security. Three Microsoft insiders help you fully leverage Microsoft Purview, Microsoft Enterprise Mobility + Security (EMS), Azure AD, Exchange Online, Microsoft Teams, SharePoint Online, OneDrive for Business, and more. Discover how experts tackle today's key tasks and challenge yourself to new levels of mastery. Plan deployment, understand downstream impacts, and avoid pitfalls Prepare your environment, establish governance, and enforce compliance Assess and improve security posture with Microsoft 365 Secure Score Move to identity-based security with Microsoft Enterprise Mobility + Security (EMS) Plan identity types, authentication, identity federation, and AAD Connect deployment Replace costly premises infrastructure with cloud-based Azure synchronization Manage complex Azure AD scenarios such as mergers, acquisitions, and divestitures Automate Azure to improve consistency, security, and standardization Prepare for Exchange Online cloud-only deployments, hybrid coexistence, and migration Move mailboxes and public folders to Exchange Online Understand Microsoft Teams concepts, architecture, and user interface Support meetings, webinars, and live events Deliver full-featured telephony solutions with Teams Phone System Implement telephony scheduling, room collaboration, automation, and IVR Use SharePoint Online to manage content and extend it with analytics and dashboards   For IT Professionals and Consultants Your role: You have, or will have, responsibilities for deploying, migrating to, or managing some or all of a Microsoft 365 environment Prerequisites: For individuals at any stage of their cloud journey

Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New): Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New)
R2,545 Discovery Miles 25 450 Ships in 12 - 17 working days

Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

Future Information Technology - FutureTech 2013 (Hardcover, 2014 ed.): James J (Jong Hyuk) Park, Ivan Stojmenovic, Min Choi,... Future Information Technology - FutureTech 2013 (Hardcover, 2014 ed.)
James J (Jong Hyuk) Park, Ivan Stojmenovic, Min Choi, Fatos Xhafa
R7,249 R6,779 Discovery Miles 67 790 Save R470 (6%) Ships in 12 - 17 working days

Future technology information technology stands for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, user experience and HCI, security and trust computing and so on, for satisfying our ever-changing needs. In past twenty five years or so, Information Technology (IT) influenced and changed every aspect of our lives and our cultures. These proceedings foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization.

Amazon Elastic File System User Guide (Hardcover): Documentation Team Amazon Elastic File System User Guide (Hardcover)
Documentation Team
R1,303 Discovery Miles 13 030 Ships in 10 - 15 working days
Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019): Song Y. Yan Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019)
Song Y. Yan
R3,508 Discovery Miles 35 080 Ships in 10 - 15 working days

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.): Pascal Bouvry, Horacio... Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.)
Pascal Bouvry, Horacio Gonzalez-Velez, Joanna Kolodziej
R4,509 Discovery Miles 45 090 Ships in 10 - 15 working days

One of the most challenging issues for the intelligent decision systems is to effectively manage the large-scale complex distributed environments such as computational clouds, grids, ad hoc and P2P networks, under the different types of users, their relations, and real-world uncertainties. In this context the IT resources and services usually belong to different owners (institutions, enterprises, or individuals) and are managed by different administrators. These administrators conform to different sets of rules and configuration directives, and can impose different usage policies on the system users. Additionally, uncertainties are presented in various types of information that are incomplete, imprecise, fragmentary or overloading, which hinders the full and precise determination of the evaluation criteria, their subsequent and selection, the assignment scores, and eventually the final integrated decision result.

This book presents new ideas, analysis, implementations and evaluation of the next generation intelligent techniques for solving complex decision problems in large-scale distributed systems. In 15 chapters several important formulations of the decision problems in heterogeneous environments are identified and a review of the recent approaches, from game theoretical models and computational intelligent techniques, such as genetic, memetic and evolutionary algorithms, to intelligent multi-agent systems and networking are presented. We believe that this volume will serve as a reference for the students, researchers and industry practitioners working in or are interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp key concerns and potential solutions on the selected topics."

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R3,061 Discovery Miles 30 610 Ships in 10 - 15 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

Libro Cientifico - Investigaciones En Tecnologias de Informacion Informatica y Computacion (English, Spanish, Hardcover): Jorge... Libro Cientifico - Investigaciones En Tecnologias de Informacion Informatica y Computacion (English, Spanish, Hardcover)
Jorge Vasquez
R725 Discovery Miles 7 250 Ships in 12 - 17 working days

Biografias Lotzy Beatriz Fonseca Chiu. Nacio en Guadalajara, Jalisco, estudio la Licenciatura en Informatica en la Universidad de Guadalajara, actualmente Profesor en el Centro Universitario de Ciencias Exactas e Ingenierias CUCEI, y asesor adjunto en el Sistema de Universidad Virtual de la Universidad de Guadalajara. Ganadora del 6to concurso de docentes innovadores organizado por Microsoft. Maria Elena Romero Gastelu. Nacio en Xalapa Enriquez, Veracruz, estudio la Licenciatura en Informatica en el Instituto Tecnologico de Tepic y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, ha sido Profesor en el Departamento de Ciencias Computacionales por 16 anos. Luis Antonio Medellin Serna. Nacio Mazatlan, Sinaloa, estudio la Licenciatura en Informatica y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, ha sido profesor en el Departamento de Ciencias Computacionales por 12 anos. Jorge Lorenzo Vasquez Padilla. Nacio Guadalajara, Jalisco, estudio la Licenciatura en Matematicas con la Orientacion en Computacion y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, estudio la Maestria en Redes y Comunicaciones en la Universidad Catolica de Avila (Zaragoza, Espana), ademas obtuvo la certificacion en el programa CCNA como instructor en Redes de Computadoras que otorga la Compania Cisco Systems, ha sido profesor en el Departamento de Ciencias Computacionales desde su creacion.

Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition.
2nd Printing. 2008): Deo... Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition. 2nd Printing. 2008)
Deo Prakash Vidyarthi, Biplab Kumer Sarker, Anil Kumar Tripathi, Laurence Tianruo Yang
R4,477 Discovery Miles 44 770 Ships in 10 - 15 working days

Scheduling in Distributed Computing Systems: Analysis, Design and Models intends to inculcate the innovative ideas for the scheduling aspect. Although the models in this book are designed for distributed systems, the same information is applicable for any type of system (i.e., where distributed processing is required). Scheduling in Distributed Computing Systems: Analysis, Design and Models will dramatically improve the design and management of the processes for industry professionals. This book deals exclusively with the scheduling aspect, which finds little space in other distributed operating system books. Scheduling in Distributed Computing Systems: Analysis, Design and Models is structured for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a reference for graduate-level students in management sciences, and computer science for distributed computing system classes.

Regularized Radial Basis Function Networks - Theory & Applications (Hardcover): PV Yee Regularized Radial Basis Function Networks - Theory & Applications (Hardcover)
PV Yee
R4,297 Discovery Miles 42 970 Ships in 10 - 15 working days

Simon Haykin is a well-known author of books on neural networks.
* An authoritative book dealing with cutting edge technology.
* This book has no competition.

RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl): Paris Kitsos, Yan Zhang RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl)
Paris Kitsos, Yan Zhang
R4,496 Discovery Miles 44 960 Ships in 12 - 17 working days

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,508 Discovery Miles 15 080
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Blockchain Technology in Corporate…
K Sood Hardcover R4,468 Discovery Miles 44 680
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,908 Discovery Miles 59 080
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970

 

Partners