0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,634)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Feedback Strategies for Wireless Communication (Hardcover, 2014 ed.): Berna OEzbek, Didier Le Ruyet Feedback Strategies for Wireless Communication (Hardcover, 2014 ed.)
Berna OEzbek, Didier Le Ruyet
R4,795 Discovery Miles 47 950 Ships in 10 - 15 working days

This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical analysis as well as practical algorithms for the required feedback information at the base stations to perform adaptive resource algorithms efficiently and mitigate interference coming from other cells.

Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback): T Lammle Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback)
T Lammle
R2,158 R1,795 Discovery Miles 17 950 Save R363 (17%) Ships in 18 - 22 working days

A two-volume set to help you prepare for success on the NEW Cisco CCNA Certification exam. Get certified and advance your technical career. To earn a Cisco Certified Network Associate (CCNA) certification, you only need to take one exam, which will validate your knowledge and skills related to everything from networking to automation. This inclusive, two-book set provides what you need to know to succeed on the new CCNA exam. The set includes Understanding Cisco Networking Technologies: Volume 1 and the CCNA Certification Study Guide: Volume 2. Understanding Cisco Networking Technologies provides comprehensive information and foundational knowledge about core Cisco technologies, helping you implement and administer Cisco solutions. The CCNA Certification Study Guide prepares you for the new CCNA certification Exam 200-301, which assesses your abilities related to network fundamentals. Both books cover a range of topics so you can get ready for the exam and apply your technical knowledge. Prepare for testing on network and security fundamentals Review network access concepts Solidify your knowledge related to IP connectivity and services Assess your automation and programmability skills Written by a Cisco expert, Todd Lammle, this set helps you master the concepts you need to succeed as a networking administrator. It also connects you to online interactive learning tools, including sample questions, a pre-assessment, practice exam, flashcards, and a glossary. If you want to earn the new CCNA certification and keep moving forward in your IT career, this book and study guide are for you.

High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.): Klaus Schmidt High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.)
Klaus Schmidt
R1,635 Discovery Miles 16 350 Ships in 18 - 22 working days

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business Continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. "High Availability and Disaster Recovery" are contributions of the IT to fulfill this requirement. And companies will be confronted with such demands to an even greater extent in the future, since their credit ratings will be lower without such precautions. Both, "High Availability and Disaster Recovery," are realized by redundant systems. Redundancy can and should be implemented on different abstraction levels: from the hardware, the operating system and middleware components up to the backup computing center in case of a disaster. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux Systems.

Internet E-Mail - Protocols, Standards, and Implementation (Hardcover): Lawrence Hughes Internet E-Mail - Protocols, Standards, and Implementation (Hardcover)
Lawrence Hughes
R3,256 Discovery Miles 32 560 Ships in 18 - 22 working days

Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.

Data Communications and Networking: Volume II (Hardcover): Michel Levine Data Communications and Networking: Volume II (Hardcover)
Michel Levine
R3,155 R2,857 Discovery Miles 28 570 Save R298 (9%) Ships in 18 - 22 working days
Optimizing Information Security and Advancing Privacy Assurance - New Technologies (Hardcover, New): Hamid R. Nemati Optimizing Information Security and Advancing Privacy Assurance - New Technologies (Hardcover, New)
Hamid R. Nemati
R4,935 Discovery Miles 49 350 Ships in 18 - 22 working days

Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary aim being the continuation and promotion of methods and theories in this far-reaching discipline.

Networks and Systems Management - Platforms Analysis and Evaluation (Hardcover, 1997 ed.): Iosif G. Ghetie Networks and Systems Management - Platforms Analysis and Evaluation (Hardcover, 1997 ed.)
Iosif G. Ghetie
R5,432 Discovery Miles 54 320 Ships in 18 - 22 working days

This book provides a comprehensive methodology for analysis and evaluation of technical characteristics and features of distributed networks and systems management platforms. The analysis covers management platforms run-time, development, and implementation environments. Operability, scalability, interoperability, and aspects of applications portability are discussed. Topics include: open systems and distributed management platforms; analysis of management platform components such as graphical user interface, event management, communications, object manipulation, database management, hardware, operating systems, distributed directory, security and time services; in-depth analysis of network and systems management applications; comprehensive evaluation of Bull ISM/OpenMaster, Cabletron Spectrum, Cambio Networks (COMMAND), Computer Associates CA-Unicenter, DEC TeMIP and PolyCenter NetView, HP OpenView, IBM NetView for AIX and TMN WorkBench for AIX Applications Development Environment, Microsoft SMS, Network Management Forum SPIRIT, Remedy Corporation ARS, Sun Solstice Enterprise Manager and SunNet Manager, and Tivoli TME management platforms and their applications; state-of-the-art in distributed management technology; network and systems management standards; practical information on evaluating and selecting management platformsA/LISTA. Networks and Systems Management: Platforms Analysis and Evaluation is a technical reference work on distributed management platforms for network operators, systems administrators, computer engineers, network designers, developers and planners. It can also be used as an advanced level textbook or reference work in courses on operation and management ofdata communications, telecommunications and distributed computing systems.

IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed.... IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed. 2016)
Khaled Salah Mohamed
R2,705 R1,804 Discovery Miles 18 040 Save R901 (33%) Ships in 10 - 15 working days

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author's practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.

Enterprise Interoperability II - New Challenges and Approaches (Hardcover, 2007 ed.): Ricardo Jardim-Goncalves, Joerg Muller,... Enterprise Interoperability II - New Challenges and Approaches (Hardcover, 2007 ed.)
Ricardo Jardim-Goncalves, Joerg Muller, Kai Mertins, Martin Zelm
R7,829 Discovery Miles 78 290 Ships in 18 - 22 working days

This volume provides a concise reference to the state-of-the-art in software interoperability. Composed of over 90 papers, Enterprise Interoperability II ranges from academic research through case studies to industrial and administrative experience of interoperability. The international nature of the authorship continues to broaden. Many of the papers have examples and illustrations calculated to deepen understanding and generate new ideas.

Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover): M. Sahinoglu Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover)
M. Sahinoglu
R3,851 Discovery Miles 38 510 Ships in 10 - 15 working days

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book s specifically preserved website will enable readers to utilize the course related problems. Enables the reader to use the book's website's applications to implement and see results, and use them making budgetary sense Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

High-Speed Networking for Multimedia Applications (Hardcover, 1996 ed.): Wolfgang Effelsberg, Otto Spaniol, Andre Danthine,... High-Speed Networking for Multimedia Applications (Hardcover, 1996 ed.)
Wolfgang Effelsberg, Otto Spaniol, Andre Danthine, Domenico Ferrari
R5,354 Discovery Miles 53 540 Ships in 18 - 22 working days

High-Speed Networking for Multimedia Applications presents the latest research on the architecture and protocols for high-speed networks, focusing on communication support for distributed multimedia applications. This includes the two major issues of ATM Networking and quality of service for multimedia applications. It is to be expected that most of the bandwidth in future high-speed networks will be taken up by multimedia applications, transmitting digital audio and video. Traditional networking protocols are not suitable for this as they do not provide guaranteed bandwidth, end-to-end delay or delay jitter, nor do they have addressing schemes or routing algorithms for multicast connections. High-Speed Networking for Multimedia Applications is a collection of high quality research papers which address these issues, providing interesting and innovative solutions. It is an essential reference for engineers and computer scientists working in this area. It is also a comprehensive text for graduate students of high-speed networking and multimedia applications.

Views on Evolvability of Embedded Systems (Hardcover, 2011 Ed.): Pierre Van De Laar, Teade Punter Views on Evolvability of Embedded Systems (Hardcover, 2011 Ed.)
Pierre Van De Laar, Teade Punter
R4,183 Discovery Miles 41 830 Ships in 18 - 22 working days

Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in constant need of upgrading to provide new advanced features, to deal with obsolescence, and to exploit emerging enabling technologies. Despite the importance of evolvability for these types of systems, the field has received scant attention from the scientific and engineering communities.

Views on Evolvability of Embedded Systems focuses on the topic of evolvability of embedded systems from an applied scientific perspective. In particular, the book describes results from the Darwin project that researched evolvability in the context of Magnetic Resonance Imaging (MRI) systems. This project applied the Industry-as-Laboratory paradigm, in which industry and academia join forces to ensure continuous knowledge and technology transfer during the project's lifetime. The Darwin project was a collaboration between the Embedded Systems Institute, the MRI business unit of Philips Healthcare, Philips Research, and five Dutch universities.

Evolvability was addressed from a system engineering perspective by a number of researchers from different disciplines such as software-, electrical- and mechanical engineering, with a clear focus on economic decision making. The research focused on four areas: data mining, reference architectures, mechanisms and patterns for evolvability, in particular visualization & modelling, and economic decision making. Views on Evolvability of Embedded Systems is targeted at both researchers and practitioners; they will not only find a state-of-the-art overview on evolvability research, but also guidelines to make systems more evolvable and new industrially-validated techniques to improve the evolvability of embedded systems.

Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition): Peter Kacsuk, Thomas... Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R4,024 Discovery Miles 40 240 Ships in 18 - 22 working days

From Cluster to Grid Computing is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. Distributed and Parallel Systems: From Cluster to Grid Computing is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable for advanced-level students in computer science.

Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R627 R566 Discovery Miles 5 660 Save R61 (10%) Ships in 18 - 22 working days
AWS Elastic Beanstalk Developer Guide (Hardcover): Documentation Team AWS Elastic Beanstalk Developer Guide (Hardcover)
Documentation Team
R2,967 Discovery Miles 29 670 Ships in 18 - 22 working days
Business and Consumer Analytics: New Ideas (Hardcover, 1st ed. 2019): Pablo Moscato, Natalie Jane de Vries Business and Consumer Analytics: New Ideas (Hardcover, 1st ed. 2019)
Pablo Moscato, Natalie Jane de Vries
R8,267 Discovery Miles 82 670 Ships in 10 - 15 working days

This two-volume handbook presents a collection of novel methodologies with applications and illustrative examples in the areas of data-driven computational social sciences. Throughout this handbook, the focus is kept specifically on business and consumer-oriented applications with interesting sections ranging from clustering and network analysis, meta-analytics, memetic algorithms, machine learning, recommender systems methodologies, parallel pattern mining and data mining to specific applications in market segmentation, travel, fashion or entertainment analytics. A must-read for anyone in data-analytics, marketing, behavior modelling and computational social science, interested in the latest applications of new computer science methodologies. The chapters are contributed by leading experts in the associated fields.The chapters cover technical aspects at different levels, some of which are introductory and could be used for teaching. Some chapters aim at building a common understanding of the methodologies and recent application areas including the introduction of new theoretical results in the complexity of core problems. Business and marketing professionals may use the book to familiarize themselves with some important foundations of data science. The work is a good starting point to establish an open dialogue of communication between professionals and researchers from different fields. Together, the two volumes present a number of different new directions in Business and Customer Analytics with an emphasis in personalization of services, the development of new mathematical models and new algorithms, heuristics and metaheuristics applied to the challenging problems in the field. Sections of the book have introductory material to more specific and advanced themes in some of the chapters, allowing the volumes to be used as an advanced textbook. Clustering, Proximity Graphs, Pattern Mining, Frequent Itemset Mining, Feature Engineering, Network and Community Detection, Network-based Recommending Systems and Visualization, are some of the topics in the first volume. Techniques on Memetic Algorithms and their applications to Business Analytics and Data Science are surveyed in the second volume; applications in Team Orienteering, Competitive Facility-location, and Visualization of Products and Consumers are also discussed. The second volume also includes an introduction to Meta-Analytics, and to the application areas of Fashion and Travel Analytics. Overall, the two-volume set helps to describe some fundamentals, acts as a bridge between different disciplines, and presents important results in a rapidly moving field combining powerful optimization techniques allied to new mathematical models critical for personalization of services. Academics and professionals working in the area of business anyalytics, data science, operations research and marketing will find this handbook valuable as a reference. Students studying these fields will find this handbook useful and helpful as a secondary textbook.

Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.): Radhika Ranjan Roy Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.)
Radhika Ranjan Roy
R8,269 Discovery Miles 82 690 Ships in 18 - 22 working days

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book.

"Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

Communication-Based Systems - Proceeding of the 3rd International Workshop held at the TU Berlin, Germany, 31 March - 1 April... Communication-Based Systems - Proceeding of the 3rd International Workshop held at the TU Berlin, Germany, 31 March - 1 April 2000 (Hardcover, 2000 ed.)
Gunter Hommel
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

Since 1990 the German Research Society (Deutsche Forschungsgemeinschaft, DFG) has been funding PhD courses (Graduiertenkollegs) at selected universi- ties in the Federal Republic of Germany. TU Berlin has been one of the first universities joining that new funding program of DFG. The PhD courses have been funded over aperiod of 9 years. The grant for the nine years sums up to approximately 5 million DM. Our Grnduiertenkolleg on Communication-based Systems has been assigned to the Computer Science Department of TU Berlin although it is a joined effort of all three universities in Berlin, Technische Uni- versitat (TU), Freie Universitat (FU), and Humboldt Universitat (HU). The Graduiertenkolleg has been started its program in October 1991. The professors responsible for the program are: Hartmut Ehrig (TU), Gunter Hommel (TU), Stefan Jahnichen (TU), Peter Lohr (FU), Miroslaw Malek (RU), Peter Pep- per (TU), Radu Popescu-Zeletin (TU), Herbert Weber (TU), and Adam Wolisz (TU). The Graduiertenkolleg is a PhD program for highly qualified persons in the field of computer science. Twenty scholarships have been granted to fellows of the Graduiertenkolleg for a maximal period of three years. During this time the fellows take part in a selected educational program and work on their PhD thesis.

Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Hardcover, 2001 ed.): Myungchul Kim, Byoungmoon Chin,... Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Hardcover, 2001 ed.)
Myungchul Kim, Byoungmoon Chin, Sungwon Kang, Danhyung Lee
R5,396 Discovery Miles 53 960 Ships in 18 - 22 working days

FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for Distributed Systems and Communication Protocols) and PSTV (Protocol Specification, Testing and Verification) conferences. This year the conference has a new name FORTE (Formal Techniques for Networked and Distributed Systems). The previous FORTE began in 1989 and the PSTV conference in 1981. Therefore the new FORTE conference actually has a long history of 21 years. The purpose of this conference is to introduce theories and formal techniques applicable to various engineering stages of networked and distributed systems and to share applications and experiences of them. This FORTE 2001 conference proceedings contains 24 refereed papers and 4 invited papers on the subjects. We regret that many good papers submitted could not be published in this volume due to the lack of space. FORTE 2001 was organized under the auspices of IFIP WG 6.1 by Information and Communications University of Korea. It was financially supported by Ministry of Information and Communication of Korea. We would like to thank every author who submitted a paper to FORTE 2001 and thank the reviewers who generously spent their time on reviewing. Special thanks are due to the reviewers who kindly conducted additional reviews for rigorous review process within a very short time frame. We would like to thank Prof. Guy Leduc, the chairman of IFIP WG 6.1, who made valuable suggestions and shared his experiences for conference organization.

Internet Optical Infrastructure - Issues on Monitoring and Failure Restoration (Hardcover, 2015 ed.): Janos Tapolcai, Pin-Han... Internet Optical Infrastructure - Issues on Monitoring and Failure Restoration (Hardcover, 2015 ed.)
Janos Tapolcai, Pin-Han Ho, Peter Babarczi, Lajos Ronyai
R3,064 R1,893 Discovery Miles 18 930 Save R1,171 (38%) Ships in 10 - 15 working days

This book covers the issues of monitoring, failure localization, and restoration in the Internet optical backbone, and focuses on the progress of state-of-the-art in both industry standard and academic research. The authors summarize, categorize, and analyze the developed technology in the context of Internet fault management and failure recovery under the Generalized Multi-Protocol Label Switching (GMPLS), via both aspects of network operations and theories.

Advanced Wirebond Interconnection Technology (Mixed media product, 2004 ed.): Shankara K. Prasad Advanced Wirebond Interconnection Technology (Mixed media product, 2004 ed.)
Shankara K. Prasad
R8,013 Discovery Miles 80 130 Ships in 18 - 22 working days

From the reviews:

"This book is intended for an assembly production house setting, appropriate for management, designers, chief operators, as well as wirebond production engineers. Operational issues such as specifying and optimizing wire and automatic bonders for a product line are included.

The book is very good with "visual" explanations for quick grasping of the issues. In addition, the fundamental metallurgical or mechanical root causes behind material and process choices are presented.

The book has a clear prose style and a very readable font and page layout. The figures, although effective, are simply low resolution screen prints from a personal computer and thus have aliasing and fuzziness.

This book has excellent overall tutorial and enough description of wire and bonding equipment so the reader could specify and negotiate correctly for with suppliers. The majority of the book dwells on establishing the bonding process for a particular product; determining the "window" of adjustments. The book ends with discussions on establishing quality metrics and reliability assurance tests.

Each chapter of the book includes enough tutorial information to allow it to alone with little need to page backwards. A short but good reference section is at the end.

If you have not read a wirebonding book, or the one you read 10 years ago was borrowed and never returned, now is the time to buy this book." (" CMPT Newsletter," June 2005)

High-Performance Networks for Multimedia Applications (Hardcover, 1999 ed.): Andre Danthine, Otto Spaniol, Wolfgang Effelsberg,... High-Performance Networks for Multimedia Applications (Hardcover, 1999 ed.)
Andre Danthine, Otto Spaniol, Wolfgang Effelsberg, Domenico Ferrari
R2,757 Discovery Miles 27 570 Ships in 18 - 22 working days

High-Performance Networks for Multimedia Applications presents the latest research on the services and protocols for networks providing the communication support for distributed multimedia applications. The need for end-to-end QoS for these multimedia applications is raising the stakes for a powerful shaping and scheduling in the network adapter. It is also creating a need for new services at the ATM layer, CBR and VBR being augmented by UBR, ABR and GFR which have to be evaluated in the TCP/IP environment of today and tomorrow. With the pressure of all the new technologies available today, the backbone architecture needs to be revisited and the success of the TCP/IP must not eliminate the possibility of adding a native ATM access to it. Most of the research in communication services such as IntServ, DiffServ and Native ATM is driven by the requirements of multimedia systems and this book illustrates the new emphasis by bringing telecommunication and computer communication experts together with application designers. This is particularly true for the security issues also addressed here. Last but not least, modeling techniques and mathematical models are essential to assess the performance of the networks to be built and to evaluate next century scenarios unachievable by a simple scaling of today's solutions. High-Performance Networks for Multimedia Applications is a collection of high quality research papers and the in-depth treatment of the subjects provides interesting and innovative solutions. It is an essential reference for telecommunication and computer experts and QoS-based application designers. It is also a comprehensive text for graduate students in high-perforrnance networks and multimedia applications.

Security Engineering for Cloud Computing - Approaches and Tools (Hardcover): David G. Rosado, Daniel Mellado, Eduardo... Security Engineering for Cloud Computing - Approaches and Tools (Hardcover)
David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, Mario Piattini
R4,902 Discovery Miles 49 020 Ships in 18 - 22 working days

Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.

Semantic Grid: Model, Methodology, and Applications (Hardcover, 2008 ed.): Zhaohui Wu, Huajun Chen Semantic Grid: Model, Methodology, and Applications (Hardcover, 2008 ed.)
Zhaohui Wu, Huajun Chen
R4,024 Discovery Miles 40 240 Ships in 18 - 22 working days

Semantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. First, scientific issues of semantic grid systems are covered, followed by two basic technical issues, data-level semantic mapping, and service-level semantic interoperating. Two killer applications are then introduced to show how to build a semantic grid for specific application domains. Although this book is organized in a step by step manner, each chapter is independent. Detailed application scenarios are also presented. In 1990, Prof. Wu invented the first KB-system tool, ZIPE, based on C on a SUN platform. He proposed the first coupling knowledge representing model, Couplingua, which embodies Rule, Frame, Semantic Network and Nerve Cell Network, and supports symbol computing and data processing computing. His current focus is on semantic web, grid & ubiquitous computing, and their applications in the life sciences.

Next Generation Intelligent Optical Networks - From Access to Backbone (Hardcover, Approx. 368p. T): Stamatios Kartalopoulos Next Generation Intelligent Optical Networks - From Access to Backbone (Hardcover, Approx. 368p. T)
Stamatios Kartalopoulos
R2,710 Discovery Miles 27 100 Ships in 18 - 22 working days

Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica ?ber with a single wavelength modulated at low data rates, it was quickly demonstrated that ?ber can deliver much more bandwidth than any other transmission medium, twisted pair wire, coaxial cable, or wireless. Since then, the optical network evolved to include more exciting technologies, gratings, optical ?lters, optical multiplexers, and optical ampli?ers so that today a single ?ber can transport an unprecedented aggregate data rate that exceeds Tbps, and this is not the upper limit yet. Thus, the ?ber optic network has been the network of choice, and it is expected to remain so for many generationsto come, for both synchronousand asynchronouspayloads; voice, data, video, interactive video, games, music, text, and more. In the last few years, we have also witnessed an increase in network attacks as a result of store andforwardcomputer-basednodes. These attackshave manymaliciousobjectives: harvestsomeone else's data, impersonate another user, cause denial of service, destroy ?les, and more. As a result, a new ?eld in communicationis becomingimportant, communicationnetworksand informationse- rity. In fact, the network architect and system designer is currently challenged to include enhanced features such as intruder detection, service restoration and countermeasures, intruder avoidance, and so on. In all, the next generation optical network is intelligent and able to detect and outsmart malicious intruders.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Digital Health - Mobile and Wearable…
Shabbir Syed-Abdul, Xinxin Zhu, … Paperback R2,525 Discovery Miles 25 250
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080

 

Partners