0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (352)
  • R250 - R500 (931)
  • R500+ (15,838)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.): Deji Chen, Mark Nixon, Aloysius Mok WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.)
Deji Chen, Mark Nixon, Aloysius Mok
R2,959 Discovery Miles 29 590 Ships in 10 - 15 working days

The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

Wideband CDMA for Third Generation Mobile Communications (Hardcover): Tero Ojanpera, Ramjee Prasad Wideband CDMA for Third Generation Mobile Communications (Hardcover)
Tero Ojanpera, Ramjee Prasad
R3,967 Discovery Miles 39 670 Ships in 10 - 15 working days

This text evaluates wideband CDMA as an effective third generation technology option, giving a picture of the various wideband CDMA standardization activities underway worldwide in the late 1990s. The book compares a range of CDMA design techniques and examines how each affects system performance. It also describes how third generation system applications will impact radio access system design and compares and contrasts each major wideband CDMA standardization proposal currently on the table, including FRAMES wideband CDMA in Europe, Core-A in Japan, wideband IS-95 in the US, and wideband CDMA in Korea. It identifies and describes various air interface access schemes for third and fourth generation mobile communications systems; analyzes wideband CDMA performance in varying radio environments; and discusses the integration of the GSM core network with wideband CDMA.

Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022):... Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022)
Vera Roos, Jaco Hoffman
R1,582 Discovery Miles 15 820 Ships in 12 - 17 working days
Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,982 Discovery Miles 99 820 Ships in 10 - 15 working days
Optical Networks - Recent Advances - Recent Advances (Hardcover, 2001 ed.): Lu Ruan, Dingzhu Du Optical Networks - Recent Advances - Recent Advances (Hardcover, 2001 ed.)
Lu Ruan, Dingzhu Du
R4,434 Discovery Miles 44 340 Ships in 10 - 15 working days

With the rapid growth of bandwidth demand from network users and the advances in optical technologies, optical networks with multiterabits per-second capacity has received significant interest from both researchers and practitioners. Optical networks deployment raises a number of challenging problems that require innovative solutions, including net work architectures, scalable and fast network management, resource efficient routing and wavelength assignment algorithms, QoS support and scheduling algorithms, and switch and router architectures. In this book, we put together some important developments in this exiting area during last several years. Some of the articles are research papers and some are surveys. All articles were reviewed by two reviewers. The paper, "On Dynamic Wavelength Assignment in WDM Optical Networks," by Alanyali gives an overview of some issues in the analy sis and synthesis of dynamic wavelength assignment policies for optical WDM networks and illustrates a new method of analysis. The paper by Ellinas and Bala, "Wavelength Assignment Algorithms for WDM Ring Architectures," presents two optimal wavelength assignment algorithms that assign the minimum number of wavelengths between nodes on WDM rings to achieve full mesh connectivity. In the paper, "Optimal Placement of Wavelength Converters in WDM Networks for Parallel and Distributed Computing Systems," Jia et al."

Communication Infrastructures for Cloud Computing (Hardcover, New): Hussein T. Mouftah, Burak Kantarci Communication Infrastructures for Cloud Computing (Hardcover, New)
Hussein T. Mouftah, Burak Kantarci
R5,303 Discovery Miles 53 030 Ships in 12 - 17 working days

Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.

Distance Learning Technology and Applications (Hardcover): Daniel Minoli Distance Learning Technology and Applications (Hardcover)
Daniel Minoli
R2,919 Discovery Miles 29 190 Ships in 10 - 15 working days

An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,802 Discovery Miles 28 020 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Secret Colors (Hardcover): Martin Kleppmann Secret Colors (Hardcover)
Martin Kleppmann; Illustrated by Mitch Seymour
R572 Discovery Miles 5 720 Ships in 12 - 17 working days
Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,804 Discovery Miles 28 040 Ships in 10 - 15 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Protocols for High Speed Networks IV (Hardcover, 1995 ed.): G. Neufeld, Mito Protocols for High Speed Networks IV (Hardcover, 1995 ed.)
G. Neufeld, Mito
R4,443 Discovery Miles 44 430 Ships in 10 - 15 working days

Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.

Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,368 R3,439 Discovery Miles 34 390 Save R929 (21%) Ships in 12 - 17 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Handbook of Signal Processing Systems (Hardcover, Edition.): Shuvra S. Bhattacharyya, Ed F. Deprettere, Rainer Leupers, Jarmo... Handbook of Signal Processing Systems (Hardcover, Edition.)
Shuvra S. Bhattacharyya, Ed F. Deprettere, Rainer Leupers, Jarmo Takala
R5,697 Discovery Miles 56 970 Ships in 10 - 15 working days

It gives me immense pleasure to introduce this timely handbook to the research/- velopment communities in the ?eld of signal processing systems (SPS). This is the ?rst of its kind and represents state-of-the-arts coverage of research in this ?eld. The driving force behind information technologies (IT) hinges critically upon the major advances in both component integration and system integration. The major breakthrough for the former is undoubtedly the invention of IC in the 50's by Jack S. Kilby, the Nobel Prize Laureate in Physics 2000. In an integrated circuit, all components were made of the same semiconductor material. Beginning with the pocket calculator in 1964, there have been many increasingly complex applications followed. In fact, processing gates and memory storage on a chip have since then grown at an exponential rate, following Moore's Law. (Moore himself admitted that Moore's Law had turned out to be more accurate, longer lasting and deeper in impact than he ever imagined. ) With greater device integration, various signal processing systems have been realized for many killer IT applications. Further breakthroughs in computer sciences and Internet technologies have also catalyzed large-scale system integration. All these have led to today's IT revolution which has profound impacts on our lifestyle and overall prospect of humanity. (It is hard to imagine life today without mobiles or Internets ) The success of SPS requires a well-concerted integrated approach from mul- ple disciplines, such as device, design, and application.

Surviving Cyberwar (Hardcover): Richard Stiennon Surviving Cyberwar (Hardcover)
Richard Stiennon
R2,248 Discovery Miles 22 480 Ships in 12 - 17 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Phase and Phase-Difference Modulation in Digital Communications (Hardcover): Yuriy Okunev Phase and Phase-Difference Modulation in Digital Communications (Hardcover)
Yuriy Okunev
R4,624 Discovery Miles 46 240 Ships in 10 - 15 working days

Learn how and when to apply the latest phase and phase-difference modulation (PDM) techniques with this valuable guide for systems engineers and researchers. It helps you cut design time and fine-tune system performance.

Peer-to-Peer Video - The Economics, Policy, and Culture of Today's New Mass Medium (Hardcover, 2008 ed.): Eli M. Noam,... Peer-to-Peer Video - The Economics, Policy, and Culture of Today's New Mass Medium (Hardcover, 2008 ed.)
Eli M. Noam, Lorenzo Maria Pupillo
R2,980 Discovery Miles 29 800 Ships in 10 - 15 working days

Peer-to-Peer (P2P) networks allow individuals to share digital content files in real time. They facilitate communication and promote community without hierarchy or strict control. This book applies economic principles to analyze and understand the P2P phenomenon. It also provides numerous contemporary examples from the US and around the world to shed light on the implications of P2P as a mass medium, considering such issues as pricing, licensing, security, and regulation.

Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017): Suresh Chandra... Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017)
Suresh Chandra Satapathy, Vikrant Bhateja, K Srujan Raju, B. Janakiramaiah
R8,202 Discovery Miles 82 020 Ships in 10 - 15 working days

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

Roadside Networks for Vehicular Communications - Architectures, Applications, and Test Fields (Hardcover): Robil Daher, Alexey... Roadside Networks for Vehicular Communications - Architectures, Applications, and Test Fields (Hardcover)
Robil Daher, Alexey Vinel
R5,083 Discovery Miles 50 830 Ships in 10 - 15 working days

Roadside Networks for Vehicular Communications: Architectures, Applications, and Test Fields attempts to close the gap between science and technology in the field of roadside backbones for VCNs. This collection will be useful not only for researchers and engineers at universities, but for students in the fields of wireless communication networks, especially vehicular communication networks, and backbone networks as well.

Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16 (Hardcover, 1st ed. 2017): Rachid El-Azouzi, Daniel Sadoc... Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16 (Hardcover, 1st ed. 2017)
Rachid El-Azouzi, Daniel Sadoc Menasche, Essaid Sabir, Francesco De Pellegrini, Mustapha Benjillali
R5,585 Discovery Miles 55 850 Ships in 10 - 15 working days

This volume offers the proceedings of the 2nd UNet conference, held in Casablanca May 30 - June 1, 2016. It presents new trends and findings in hot topics related to ubiquitous computing/networking, covered in three tracks and three special sessions: Main Track 1: Context-Awareness and Autonomy Paradigms Track Main Track 2: Mobile Edge Networking and Virtualization Track Main Track 3: Enablers, Challenges and Applications Special Session 1: Smart Cities and Urban Informatics for Sustainable Development Special Session 2: Unmanned Aerial Vehicles From Theory to Applications Special Session 3: From Data to Knowledge: Big Data applications and solutions

The Mobile Communications Handbook (Hardcover, 2nd ed. 1999): Jerry D. Gibson The Mobile Communications Handbook (Hardcover, 2nd ed. 1999)
Jerry D. Gibson
R5,641 Discovery Miles 56 410 Ships in 10 - 15 working days

In a single volume, The Mobile Communications Handbook covers the entire field, from principles of analog and digital communications to cordless telephones, wireless local area networks (LANs), and international technology standards. The tremendous scope of this second edition ensures that it will be the primary reference for every aspect of mobile communications. Details and references follow preliminary discussions, ensuring that the reader obtains the most accurate information available on the particular topic.

Network Management and Control (Hardcover, 1990 ed.): A. Kershenbaum, Manu Malek, M. Wall Network Management and Control (Hardcover, 1990 ed.)
A. Kershenbaum, Manu Malek, M. Wall
R4,513 Discovery Miles 45 130 Ships in 12 - 17 working days

Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.

Applied Social Network Analysis With R: Emerging Research and Opportunities (Hardcover): Mehmet Gencer Applied Social Network Analysis With R: Emerging Research and Opportunities (Hardcover)
Mehmet Gencer
R4,892 Discovery Miles 48 920 Ships in 10 - 15 working days

Understanding the social relations within the fields of business and economics is vital for the promotion of success within a certain organization. Analytics and statistics have taken a prominent role in marketing and management practices as professionals are constantly searching for a competitive advantage. Converging these technological tools with traditional methods of business relations is a trending area of research. Applied Social Network Analysis With R: Emerging Research and Opportunities is an essential reference source that materializes and analyzes the issue of structure in terms of its effects on human societies and the state of the individuals in these communities. Even though the theme of the book is business-oriented, an approach underlining and strengthening the ties of this field of study with social sciences for further development is adopted throughout. Therefore, the knowledge presented is valid for analyzing not only the organization of the business world but also for the organization of any given community. Featuring research on topics such as network visualization, graph theory, and micro-dynamics, this book is ideally designed for researchers, practitioners, business professionals, managers, programmers, academicians, and students seeking coverage on analyzing social and business networks using modern methods of statistics, programming, and data sets.

Blockchain and Cryptocurrencies (Hardcover): Asma Salman, Muthanna G. Abdul Razzaq Blockchain and Cryptocurrencies (Hardcover)
Asma Salman, Muthanna G. Abdul Razzaq
R3,444 R3,216 Discovery Miles 32 160 Save R228 (7%) Ships in 10 - 15 working days
Applied Cyber-Physical Systems (Hardcover, 2014 ed.): Sang C Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu Applied Cyber-Physical Systems (Hardcover, 2014 ed.)
Sang C Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu
R4,730 Discovery Miles 47 300 Ships in 12 - 17 working days

Applied Cyber-Physical Systems presents the latest methods and technologies in the area of cyber-physical systems including medical and biological applications. Cyber-physical systems (CPS) integrate computing and communication capabilities by monitoring, and controlling the physical systems via embedded hardware and computers. This book brings together unique contributions from renowned experts on cyber-physical systems research and education with applications. It also addresses the major challenges in CPS, and then provides a resolution with various diverse applications as examples. Advanced-level students and researchers focused on computer science, engineering and biomedicine will find this to be a useful secondary text book or reference, as will professionals working in this field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,630 Discovery Miles 56 300
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,549 Discovery Miles 65 490
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R2,779 Discovery Miles 27 790
Computer Networking and Cybersecurity
Quinn Kiser Paperback R862 R717 Discovery Miles 7 170
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Hacking For Dummies
K Beaver Paperback R534 Discovery Miles 5 340
Service management and scheduling in…
Yongkui Liu, Lin Zhang Hardcover R4,199 Discovery Miles 41 990

 

Partners