0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover)
Information Reso Management Association
R9,815 Discovery Miles 98 150 Ships in 18 - 22 working days
PC Interfacing (Paperback, 3rd ed.): Pei An PC Interfacing (Paperback, 3rd ed.)
Pei An
R1,213 Discovery Miles 12 130 Ships in 10 - 15 working days

The main links with your PC and the outside world are the centronic port, used for connecting the printer, the RS232 port, used for the mouse, and the games port for a joystick. This book explores how these input/output (I/O) ports can be put to use through a range of other interfacing applications. This is especially useful for laptop and palmtop PCs which cannot be fitted with internal I/O cards. A novel approach is taken by this book, combining the hardware through which the ports can be explored, and the software programming needed to carry out a range of experiments.
Circuits are provided for simple testing tools, and three experimental boards - which can also be purchased ready-made. Ready-to-run TurboPascal programs are available on the Newnes web site.
A huge range of applications are considered, turning the PC into a flexible core of a variety of systems. External devices considered include opto-isolator drivers, power drivers, LED drivers, relay drivers, special driver ICs, and methods of driving opto-isolated zero-crossing solid state relays, stepper motors, sound generating devices and displays. Ways of gathering information from the outside world are given, as well as connection to digital devices, remote control and digital communication.
As well as teaching in this field, Pei An has written numerous articles for magazines such as Electronics World and Electronics Today International.

A hands-on guide to exploring your PC's input/output ports
Covers the hardware and software aspects of interfacing
An exciting project-based approach to an important subject area

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.): Dongmin Kim, Salim Hariri Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.)
Dongmin Kim, Salim Hariri
R2,730 Discovery Miles 27 300 Ships in 18 - 22 working days

The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Networks and Network Analysis for Defence and Security (Hardcover, 2014): Anthony J. Masys Networks and Network Analysis for Defence and Security (Hardcover, 2014)
Anthony J. Masys
R3,410 Discovery Miles 34 100 Ships in 10 - 15 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of big data and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches."

Performance Analysis of Computer Networks (Hardcover, 2013 ed.): Matthew N.O Sadiku, Sarhan M. Musa Performance Analysis of Computer Networks (Hardcover, 2013 ed.)
Matthew N.O Sadiku, Sarhan M. Musa
R1,946 Discovery Miles 19 460 Ships in 10 - 15 working days

This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate engineering students, it may also serve as a fingertip reference for engineers developing communication networks, managers involved in systems planning, and researchers and instructors of computer communication networks.

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover): Omar Santos Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover)
Omar Santos
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organised test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco CyberOps Associate CBROPS 200-201 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test software Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Leading Cisco technology expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A video mentoring lesson from the authors Complete Video Course A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organise and optimise your study time

Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.): Chris McDonald Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.)
Chris McDonald
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This volume forms the edited proceedings of the Sixth International Symposium on Communications Interworking, held in Perth, Western Australia, from 13-16 October, 2002. In total, 39 research papers were submitted for consideration, and after full refereeing by international referees, 27 papers from authors in 11 countries were accepted for publication. Invited keynote addresses were presented by Dr Hugh Bradlow, Chief Technology Offleer for Telstra Corporation, Australia, and Dr Sathya Rao, Director ofTelscom A.G., Switzerland. The symposium brought together 60 active international researchers and telecommunications engineers to discuss the important questions as to whether there is a convergence of all communications, including real-time communications, over the Internet Protocol (IP), and whether existing IP technology is capable of supporting this convergence, or whether it requires further development of that technology. The papers selected to appear in this volume make an important and timely contribution to this debate. Specific symposium paper sessions were held to present and discuss ernerging research on the topics of converged networking, real-time communications over IP, quality of service, routing and metrics, ernerging issues in mobile networks, differentiated services, and wireless networking.

Handbook of Research on Social and Organizational Liabilities in Information Security (Hardcover): Manish Gupta, Raj Sharman Handbook of Research on Social and Organizational Liabilities in Information Security (Hardcover)
Manish Gupta, Raj Sharman
R6,714 Discovery Miles 67 140 Ships in 18 - 22 working days

As the diffusion and use of technology applications have accelerated in organizational and societal domains, behavioral and social dynamics have inevitably created the potential for negative as well as positive consequences and events associated with technology. A pressing need within organizations and societies has therefore emerged for robust, proactive information security measures that can prevent as well as ameliorate breaches, attacks, and abuses.""The Handbook of Research on Social and Organizational Liabilities in Information Security"" offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security. Aimed at providing immense scholarly value to researchers, academicians, and practitioners in the area of information technology and security, this landmark reference collection provides estimable coverage of pertinent issues such as employee surveillance, information security policies, and password authentication.

Computer-Supported Cooperative Work - Introduction to Distributed Applications (Hardcover, 2000 ed.): Uwe M. Borghoff, Johann... Computer-Supported Cooperative Work - Introduction to Distributed Applications (Hardcover, 2000 ed.)
Uwe M. Borghoff, Johann H. Schlichter
R2,679 R1,685 Discovery Miles 16 850 Save R994 (37%) Ships in 10 - 15 working days

The terms groupware and CSCW (Computer-Supported Cooperative Work) have received significant attention in computer science and related disciplines for quite some time now. This book has two main objectives: first, to outline the meaning of both terms, and second, to point out both the numerous opportunities for users of CSCW systems and the risks of applying them. The book introduces in detail an interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. CSCW can be viewed as a synergism between the areas of distributed systems and (multimedia) communications on the one hand and those of information science and socio-organizational theory on the other hand. Thus, the book is addressed to students of all these disciplines, as well as to users and developers of systems with group communication and cooperation as top priorities.

Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover): George Mastorakis, Constandinos X.... Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover)
George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R5,463 Discovery Miles 54 630 Ships in 18 - 22 working days

As more and more of our data is stored remotely, accessing that data wherever and whenever it is needed is a critical concern. More concerning is managing the databanks and storage space necessary to enable cloud systems. Resource Management of Mobile Cloud Computing Networks and Environments reports on the latest advances in the development of computationally intensive and cloud-based applications. Covering a wide range of problems, solutions, and perspectives, this book is a scholarly resource for specialists and end-users alike making use of the latest cloud technologies.

Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover): Issa Traore, Ahmed Awad E Ahmed Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover)
Issa Traore, Ahmed Awad E Ahmed
R4,917 Discovery Miles 49 170 Ships in 18 - 22 working days

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.): Subrata Goswami Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.)
Subrata Goswami
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

IP technology has progressed from being a scientific topic to being one of the most popular technologies in networking. Concurrently, a number of new innovations and technological advances have been developed and brought to the marketplace. These new ideas, concepts and products are likely to have a tremendous influence on businesses and on our everyday lives. This book addresses many of these newer technological developments and provides insights for engineers and scientists developing new technological components, devices and products. explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by application so that readers can better understand the uses of IP technology. Included are details of implementation issues and state-of-the-art equipment and software. descriptions of Cisco 12410 GSR and Juniper M160, and IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.

Metropolitan Area WDM Networks - An AWG Based Approach (Hardcover, 2004 ed.): Martin Maier Metropolitan Area WDM Networks - An AWG Based Approach (Hardcover, 2004 ed.)
Martin Maier
R4,071 Discovery Miles 40 710 Ships in 18 - 22 working days

Metropolitan Area WDM Networks: An AWG Based Approach provides a comprehensive and technically detailed overview of the latest metropolitan area WDM network experimental systems, architectures, and access protocols. Its main focus is on the novel star WDM networks based on a wavelength-selective Arrayed-Waveguide Grating (AWG). Network researchers, engineers, professionals, and graduate students will benefit from the thorough overview and gain an in-depth understanding of current and next-generation metro WDM networks.

The AWG based metro star WDM network is discussed at length and extensively investigated by means of stochastic analyses and simulations. The book provides:
*an up-to-date overview of ring and star metro WDM networks and access protocols,
*in-depth performance comparison studies of AWG based multihop vs. single-hop WDM networks and AWG vs. Passive Star Coupler based single-hop WDM networks,
*a thorough description of the AWG based network and node architectures and access protocols,
*a novel highly-efficient approach to provide survivability for star WDM networks,
*extensive analytical results for both unicast and multicast variable-size packet traffic and bandwidth on demand,
*supplementary simulation results, including packet header trace files.

Networking Security and Standards (Hardcover, 1997 ed.): Weidong Kou Networking Security and Standards (Hardcover, 1997 ed.)
Weidong Kou
R4,128 Discovery Miles 41 280 Ships in 18 - 22 working days

Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.

Human-Centered Digitalization and Services (Hardcover, 1st ed. 2019): Marja Toivonen, Eveliina Saari Human-Centered Digitalization and Services (Hardcover, 1st ed. 2019)
Marja Toivonen, Eveliina Saari
R3,372 Discovery Miles 33 720 Ships in 18 - 22 working days

This book provides a timely overview of the impacts of digitalization from the perspective of everyday life, and argues that one central issue in digitalization is the development of new types of services that digitalization enables, but which are often overlooked due to the focus on new technologies and devices. The book summarizes the past 20 years of research into the relationship between information and communications technology (ICT) and service innovation, and reveals that the ongoing digitalization is a qualitatively different phenomenon and represents a true paradigm shift. The all-encompassing integration and distribution of data raises critical issues such as preserving human dignity and individual autonomy; moreover, interaction practices that foster broad participation, trust, learning, and a willingness to share knowledge are called for. Citizen empowerment and multi-actor co-creation have become central to using digitalization to support the development of wellbeing and sustainability. Further, the book shows how employees and professionals can and should be involved in designing their future work, and in evaluating it. Proactiveness and participation in innovation endeavours are ways to guarantee meaningful work in an age of socio-technical transition. The book employs a variety of theoretical approaches and perspectives from diverse disciplines to illustrate these needs. In addition to theoretical analyses, some specific application areas are examined, e.g. services in health and social care, and problems linked to robots in elderly care. Given its scope, the book is highly recommended to all readers seeking an overview of the current understanding of the human side of digitalization and searching for concrete cases from different countries to illustrate the topic.

User Interface Evaluation - A Structured Approach (Hardcover, New): Siegfried Treu User Interface Evaluation - A Structured Approach (Hardcover, New)
Siegfried Treu
R2,429 Discovery Miles 24 290 Ships in 18 - 22 working days

Introduction: Background and Status. Design before Evaluation. Prerequisite Knowledge Areas: Supportive Tools and Techniques. Interface Structures. Basic Measures. Measurement and Evaluation: Evaluation Terms and Aspects. Tailored Measures of Performance. Evaluation Approaches and Methods. Special Topics: Stress and User Satisfaction. Visualizable Objects and Spaces. Interaction and Mental Involvement. Structural Specification and Utility. Index.

Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March... Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Mason Rice, Sujeet Shenoi
R2,915 R1,920 Discovery Miles 19 200 Save R995 (34%) Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment. This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Network-Centric Collaboration and Supporting Frameworks - IFIP TC 5 WG 5.5, Seventh IFIP Working Conference on Virtual... Network-Centric Collaboration and Supporting Frameworks - IFIP TC 5 WG 5.5, Seventh IFIP Working Conference on Virtual Enterprises, 25-27 September 2006, Helsinki, Finland (Hardcover, 2006 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus
R4,371 Discovery Miles 43 710 Ships in 18 - 22 working days

Collaborative Networks is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community. Benefiting from contributions of multiple areas, nameley management, economy, social sciences, law and ethics, etc., the area of Collaborative Networs is being consolidated as a new scientific discipline of its own. On one hand significant steps towards a stronger theoretical foundation for this new discipline are developed and applied in industry and services.

Based on the experiences and lessons learned in many research projects and pilot cases developed during the last decade, a new emphasis is now being put on the development of holistic frameworks, combining business models, conceptual models, governance principles and methods, as well as supporting infrastructures and services. In fact, researching the phase in which the computer and networking technologies provide a good starting basis for the establishment of collaborative platforms, the emphasis is now turning to the understanding of the collaboration promotion mechanisms and CN governance principles. Therefore, issues such as the value systems, trust, performance and benefits distribution are gaining more importance. Encompassing all these developments, the efforts to develp reference models for collaborative networks represent a major challenge in order to provide the foundation for further developments of the CN.

PRO-VE represents a good synthesis of the work in this area, and plays an active role in the promotion of these activities. Being recognized as the most focused scientific and technical conference on CollaborativeNetworks, PRO-VE continues to offer the opportunity for presentation and discussion of both the latest research developments as well as the practical application case studies. Following the vision of IFIP and SOCOLNET, the PRO-VE conference offers a forum for collaboration and knowledge exchange among experts from different regions of the world.

Design of Optical WDM Networks - LAN, MAN and WAN Architectures (Hardcover, 2001 ed.): Byrav Ramamurthy Design of Optical WDM Networks - LAN, MAN and WAN Architectures (Hardcover, 2001 ed.)
Byrav Ramamurthy
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

Lo, soul! seest thou not God's purpose from the first? The earth to be spann'd, connected by net-work From Passage to India! Walt Whitman, "Leaves of Grass", 1900. The Internet is growing at a tremendous rate today. New services, such as telephony and multimedia, are being added to the pure data-delivery framework of yesterday. Such high demands on capacity could lead to a "bandwidth-crunch" at the core wide-area network resulting in degra dation of service quality. Fortunately, technological innovations have emerged which can provide relief to the end-user to overcome the In ternet's well-known delay and bandwidth limitations. At the physical layer, a major overhaul of existing networks has been envisaged from electronic media (such as twisted-pair and cable) to optical fibers - in the wide area, in the metropolitan area, and even in the local area set tings. In order to exploit the immense bandwidth potential of the optical fiber, interesting multiplexing techniques have been developed over the years. Wavelength division multiplexing (WDM) is such a promising tech nique in which multiple channels are operated along a single fiber si multaneously, each on a different wavelength. These channels can be independently modulated to accommodate dissimilar bit rates and data formats, if so desired. Thus, WDM carves up the huge bandwidth of an optical fiber into channels whose bandwidths (1-10 Gbps) are compati ble with peak electronic processing speed.

Ad-hoc Networks: Fundamental Properties and Network Topologies (Mixed media product, 2006 ed.): Ramin Hekmat Ad-hoc Networks: Fundamental Properties and Network Topologies (Mixed media product, 2006 ed.)
Ramin Hekmat
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides an original graph theoretical approach to the fundamental properties of wireless mobile ad-hoc networks. This approach is combined with a realistic radio model for physical links between nodes to produce new insight into network characteristics like connectivity, degree distribution, hopcount, interference and capacity. The book establishes directives for designing ad-hoc networks and sensor networks. It will interest the academic community, and engineers who roll out ad-hoc and sensor networks.

Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on... Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Bernd Kleinjohann, Lisa Kleinjohann, Marilyn Wolf
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."

Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.): Wuyi Yue,... Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.)
Wuyi Yue, Yutaka Matsumoto
R4,199 Discovery Miles 41 990 Ships in 18 - 22 working days

With rapid increase of mobile users of laptop computers and cellular phones, support of Internet services like e-mail and World Wide Web (WWW) access in a mobile environment is an indispensable requirement. The wireless networks must have the ability to provide real-time bursty traffic (such as voice or video) and data traffic in a multimedia environment with high quality of service. To satisfy the huge demand for wireless multimedia service, efficient channel access methods must be devised. For design and tuning of the channel access methods, the system performance must be mathematically analysed. To do so, very accurate models, that faithfully reproduce the stochastic behaviour of multimedia wireless communication and computer networks, must be constructed.
There exist several books on the performance analysis and evaluation for data communication networks or computer networks. This book attempts to present exact and approximate analytical solution methods and techniques using queueing theory in the complex multimedia traffic systems with procedures of random multiple access schemes. In particular, this book presents how to approximate the system performance of discrete-time multimedia networks, the probability distribution of the interarrival time of internetwork packets at the adjacent network and the higher moments of the transmission departure distribution and delay in wireless multimedia communication environment. In general the modeling of discrete-time multimedia communication systems are more complex than that of continuous-time systems because multiple state changes can occur from one time-unit to the next. This complicates the analysis of the model. This book alsodiscusses numerical results that illustrate the applications of the theory and various properties.
Performance Analysis of Multichannel and Multi-Traffic on Wireless Communication Networks should prove useful to a post-graduate course in computer science or electrical engineering. It can be a pre requisite to some other more advanced courses like network design and management or queueing theory with applications to multimedia communication and computer networks. It can also be used for a course on stochastic models in applied mathematics and operations research departments.

Secure Group Communications Over Data Networks (Hardcover, 2005 ed.): Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras Secure Group Communications Over Data Networks (Hardcover, 2005 ed.)
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Targeting Uplift - An Introduction to…
Rene Michel, Igor Schnakenburg, … Hardcover R2,705 Discovery Miles 27 050
Integration of Data Mining in Business…
Ana Azevedo, Manuel Filipe Santos Hardcover R5,056 Discovery Miles 50 560
Domain Driven Data Mining
Longbing Cao, Philip S. Yu, … Hardcover R2,792 Discovery Miles 27 920
Agents and Multi-agent Systems…
Gordan Jezic, Yun-Heh Jessica Chen-Burger, … Hardcover R5,201 Discovery Miles 52 010
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, … Hardcover R1,961 R1,830 Discovery Miles 18 300
New Opportunities for Sentiment Analysis…
Aakanksha Sharaff, G. R. Sinha, … Hardcover R6,648 Discovery Miles 66 480
Data Science and Big Data: An…
Witold Pedrycz, Shyi-Ming Chen Hardcover R4,705 Discovery Miles 47 050
Data Simplification - Taming Information…
Jules J. Berman Paperback R1,224 Discovery Miles 12 240
Machine Learning Foundations…
Taeho Jo Hardcover R4,070 Discovery Miles 40 700
Transforming Businesses With Bitcoin…
Dharmendra Singh Rajput, Ramjeevan Singh Thakur, … Hardcover R5,938 Discovery Miles 59 380

 

Partners