0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (334)
  • R250 - R500 (886)
  • R500+ (13,957)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cloud Computing and Virtualization Technologies in Libraries (Hardcover, New): Sangeeta N. Dhamdhere Cloud Computing and Virtualization Technologies in Libraries (Hardcover, New)
Sangeeta N. Dhamdhere
R4,860 Discovery Miles 48 600 Ships in 12 - 17 working days

The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book is essential for professionals, students, and researchers interested in cloud library management and development in different types of information environments.

Communication Networking - An Analytical Approach (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Communication Networking - An Analytical Approach (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R2,342 Discovery Miles 23 420 Ships in 12 - 17 working days

Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.

The Internet and Its Protocols - A Comparative Approach (Hardcover, New): Adrian Farrel The Internet and Its Protocols - A Comparative Approach (Hardcover, New)
Adrian Farrel
R1,610 Discovery Miles 16 100 Ships in 12 - 17 working days

The view presented in "The Internet and Its Protocols" is at once broad and deep. It covers all the common protocols and how they combine to create the Internet in its totality. More importantly, it describes each one completely, examining the requirements it addresses and the exact means by which it does its job. These descriptions include message flows, full message formats, and message exchanges for normal and error operation. They are supported by numerous diagrams and tables.
This book's comparative approach gives you something more valuable: insight into the decisions you face as you build and maintain your network, network device, or network application. Author Adrian Farrel s experience and advice will dramatically smooth your path as you work to offer improved performance and a wider range of services.
* Provides comprehensive, in-depth, and comparative coverage of the Internet Protocol (both IPv4 and IPv6) and its many related technologies.
* Written for developers, operators, and managers, and designed to be used as both an overview and a reference.
* Discusses major concepts in traffic engineering, providing detailed looks at MPLS and GMPLS and how they control both IP and non-IP traffic.
* Covers protocols for governing routing and transport, and for managing switches, components, and the network as a whole, along with higher-level application protocols.
* Offers thoughtful guidance on choosing between protocols, selecting features within a protocol, and other service- and performance-related decisions."

Blockchain Technology for IoT Applications (Hardcover, 1st ed. 2021): Seok-Won Lee, Irish Singh, Masoud Mohammadian Blockchain Technology for IoT Applications (Hardcover, 1st ed. 2021)
Seok-Won Lee, Irish Singh, Masoud Mohammadian
R4,469 Discovery Miles 44 690 Ships in 12 - 17 working days

This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT. The book provides an in-depth analysis of the step-by-step evolution of IoT to create a change by enhancing the productivity of industries. It introduces how connected things, data, and their communication (data sharing) environment build a transparent, reliable, secure environment for people, processes, systems, and services with the help of blockchain technology.

Video over Cognitive Radio Networks - When Quality of Service Meets Spectrum (Hardcover, 2014 ed.): Shiwen Mao Video over Cognitive Radio Networks - When Quality of Service Meets Spectrum (Hardcover, 2014 ed.)
Shiwen Mao
R3,920 R3,343 Discovery Miles 33 430 Save R577 (15%) Ships in 12 - 17 working days

This book focuses on the problem of video streaming over emerging cognitive radio (CR) networks. The book discusses the problems and techniques for scalable video streaming over cellular cognitive radio networks, ad hoc CR networks, cooperative CR networks, and femtocell CR networks. The authors formulate these problems and propose optimal algorithms to solve these problems. Also the book analyzes the proposed algorithms and validates the algorithms with simulations.

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018):... Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018)
Sergei Petrenko
R4,140 Discovery Miles 41 400 Ships in 12 - 17 working days

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.

Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.):... Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.)
Thomas Pfeffer
R2,929 Discovery Miles 29 290 Ships in 10 - 15 working days

The purpose of this volume is to shape conceptual tools to understand the impact of new information and communication technologies (ICTs) on the organization of universities. Traditional research-based universities, the most typical representatives of the higher education system, find themselves challenged by the speed and the wide range of technical innovations, but also by a vast array of implicit assumptions and explicit promises associated with the distribution of digital media.

The author observes that as universities increasingly use digital media (computers and the Internet) to accomplish their tasks, a transformation takes place in an "evolutionary" rather than in a revolutionary way.Using the University of Klagenfurt as an in-depth case study, he explores such dynamic issues as how digital media affect the practice of research, the preservation and dissemination of knowledge (for example, through publishing and archiving), and delivery of education at universities.More broadly, he considers issues of organizational culture and design, administration, and leadership as universities integrate digital technologies into all aspects of their operations."

Resource Allocation and MIMO for 4G and Beyond (Hardcover, 2014 ed.): Francisco Rodrigo Porto Cavalcanti Resource Allocation and MIMO for 4G and Beyond (Hardcover, 2014 ed.)
Francisco Rodrigo Porto Cavalcanti
R6,373 R5,169 Discovery Miles 51 690 Save R1,204 (19%) Ships in 12 - 17 working days

This book will be a comprehensive collection of advanced concepts related to 4th generation wireless communication systems. It will be divided into two main parts: resource allocation and transceiver architectures. These two research areas are at the core of the recent advances experimented by wireless communication systems. Each chapter will cover a relevant, timely, topic with two focuses: a first part which is of tutorial and survey nature, reviews the state of the art in that topic, followed by a more deep treatment including current research topics, case studies and performance analysis.

Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.): Ekram Hossain Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.)
Ekram Hossain
R3,017 Discovery Miles 30 170 Ships in 10 - 15 working days

Heterogeneous wireless networking, which is sometimes referred to as the fourth-generation (4G) wireless, is a new frontier in the future wireless communications technology and there has been a growing interest on this topic among researchers and engineers in both academia and industry. This book will include a set of research and survey articles featuring the recent advances in theory and applications of heterogeneous wireless networking technology for the next generation (e.g., fourth generation) wireless communications systems. With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third generation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile users in a seamless way. Fourth generation (4G) wireless systems are devised with the vision of heterogeneity in which a mobile user/device will be able to connect to multiple wireless networks (e.g., WLAN, cellular, WMAN) simultaneously. This book intends to provide a unified view on the state-of-the-art of protocols and architectures for heterogeneous wireless networking. The contributed articles will cover both the theoretical concepts and system-level implementation issues related to design, analysis, and optimization of architectures and protocols for heterogeneous wireless access networks.

Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.): Francisco Rodriguez-henriquez, N. A. Saqib, Arturo... Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.)
Francisco Rodriguez-henriquez, N. A. Saqib, Arturo Diaz Perez, Cetin Kaya Koc
R5,226 Discovery Miles 52 260 Ships in 12 - 17 working days

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017): Constandinos X. Mavromoustakis, George... Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017)
Constandinos X. Mavromoustakis, George Mastorakis, Ciprian Dobre
R5,308 Discovery Miles 53 080 Ships in 12 - 17 working days

This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.): Terry L. Friesz Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.)
Terry L. Friesz
R2,982 Discovery Miles 29 820 Ships in 10 - 15 working days

Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems.

Protocols for Secure Electronic Commerce (Hardcover, 2nd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 2nd edition)
Mostafa Hashem Sherif; Series edited by Saba Zamir
R4,723 Discovery Miles 47 230 Ships in 12 - 17 working days

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.

The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money.

Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R4,160 Discovery Miles 41 600 Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Configuring ISA Server 2004 (Paperback, 2nd ed): Thomas W. Shinder, Debra Littlejohn Shinder Configuring ISA Server 2004 (Paperback, 2nd ed)
Thomas W. Shinder, Debra Littlejohn Shinder; Edited by Martin Grasdal
R907 Discovery Miles 9 070 Ships in 12 - 17 working days

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
* This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations.
* Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities.
* Learn how to take advantage of ISA Server 2004's new VPN capabilities

Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB... Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB (Hardcover, 1st ed. 2018)
Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy
R4,442 Discovery Miles 44 420 Ships in 12 - 17 working days

This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.

The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition): Ian Foster, Carl Kesselman The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition)
Ian Foster, Carl Kesselman
R1,830 R1,730 Discovery Miles 17 300 Save R100 (5%) Ships in 12 - 17 working days

"The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge."
-From the Preface
In 1998, Ian Foster and Carl Kesselman introduced a whole new concept in computing with the first edition of this book. Today there is a broader and deeper understanding of the nature of the opportunities offered by Grid computing and the technologies needed to realize those opportunities. In Grid 2, the editors reveal the revolutionary impact of large-scale resource sharing and virtualization within science and industry, the intimate relationships between organization and resource sharing structures and the new technologies required to enable secure, reliable, and efficient resource sharing on large scale.
Foster and Kesselman have once again assembled a team of experts to present an up-to-date view of Grids that reports on real experiences and explains the available technologies and new technologies emerging from labs, companies and standards bodies. Grid 2, like its predecessor, serves as a manifesto, design blueprint, user guide and research agenda for future Grid systems.
*30 chapters including more than a dozen completely new chapters.
*Web access to 13 unchanged chapters from the first edition.
*Three personal essays by influential thinkers on the significance of Grids from the perspectives of infrastructure, industry, and science.
*A foundational overview of the central Grid concepts and architectural principles.
*Twelve application vignettes showcase working Grids in science, engineering, industry, and commerce.
*Detailed discussions of core architecture and services, data and knowledge management, and higher-level tools.
*Focused presentations on production Grid deployment, computing platforms, peer-to-peer technologies, and network infrastructures.
*Extensive bibliography and glossary.

Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019): Mohammad S. Obaidat, Issa Traore, Isaac Woungang Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019)
Mohammad S. Obaidat, Issa Traore, Isaac Woungang
R4,871 R4,513 Discovery Miles 45 130 Save R358 (7%) Ships in 12 - 17 working days

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R7,105 R6,572 Discovery Miles 65 720 Save R533 (8%) Ships in 12 - 17 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Steiner Trees in Industry (Hardcover, 2001 ed.): Xiuzhen Cheng, Dingzhu Du Steiner Trees in Industry (Hardcover, 2001 ed.)
Xiuzhen Cheng, Dingzhu Du
R6,014 Discovery Miles 60 140 Ships in 10 - 15 working days

This book is a collection of articles studying various Steiner tree prob lems with applications in industries, such as the design of electronic cir cuits, computer networking, telecommunication, and perfect phylogeny. The Steiner tree problem was initiated in the Euclidean plane. Given a set of points in the Euclidean plane, the shortest network interconnect ing the points in the set is called the Steiner minimum tree. The Steiner minimum tree may contain some vertices which are not the given points. Those vertices are called Steiner points while the given points are called terminals. The shortest network for three terminals was first studied by Fermat (1601-1665). Fermat proposed the problem of finding a point to minimize the total distance from it to three terminals in the Euclidean plane. The direct generalization is to find a point to minimize the total distance from it to n terminals, which is still called the Fermat problem today. The Steiner minimum tree problem is an indirect generalization. Schreiber in 1986 found that this generalization (i.e., the Steiner mini mum tree) was first proposed by Gauss."

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R3,037 Discovery Miles 30 370 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.): Hussein T. Mouftah, Pin-Han Ho Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.)
Hussein T. Mouftah, Pin-Han Ho
R4,481 Discovery Miles 44 810 Ships in 12 - 17 working days

Optical Networks - Architecture and Survivability, is a state-of-the-art work on survivable and cost-effective design of control and management for networks with IP directly over Wavelength Division Multiplexing (WDM) technology (or called Optical Internet). The authors address issues of signaling mechanisms, resource reservation, and survivable routing and wavelength assignment. Special emphasis has been given to the design of meshed, middle-sized, and wavelength-routed networks with dynamic traffic in the optical domain, such as the next-generation Metropolitan Area Network.

Research and development engineers, graduate students studying wavelength-routed WDM networks, and senior undergraduate students with a background in algorithms and networking will find this book interesting and useful. This work may also be used as supplemental readings for graduate courses on internetworking, routing, survivability, and network planning algorithms.

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,602 Discovery Miles 66 020 Ships in 12 - 17 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

QoS in Packet Networks (Hardcover): Kun I. Park QoS in Packet Networks (Hardcover)
Kun I. Park
R2,945 Discovery Miles 29 450 Ships in 10 - 15 working days

QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. These mathematical subjects are abstract, not easy to grasp for uninitiated persons.

QoS in Packet Networks is written with two objectives. The first explains the fundamental mathematical concepts used in QoS analysis as plainly as possible, in layman's terms to afford the reader a better appreciation of the subject of QoS treated in this book. The second explains in plain language, the various parts of QoS in packet networks, to provide the reader with a complete view of this complex and dynamic area of communications networking technology. Discussion of the functional requirements of the packet networks to provide QoS is included.

AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.): Prasant Mohapatra, Srikanth Krishnamurthy AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.)
Prasant Mohapatra, Srikanth Krishnamurthy
R4,470 Discovery Miles 44 700 Ships in 10 - 15 working days

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area.

AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,565 Discovery Miles 65 650
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R5,077 R2,976 Discovery Miles 29 760
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,565 Discovery Miles 65 650
Introduction to Copper Cabling…
John Crisp Paperback R985 Discovery Miles 9 850
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,351 Discovery Miles 13 510
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050

 

Partners