0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (831)
  • R500+ (14,107)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China,... Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China, October 22-25, 2010, Selected Papers, Part IV (Hardcover, Edition.)
Daoliang Li, Yande Liu, Yingyi Chen
R3,048 Discovery Miles 30 480 Ships in 10 - 15 working days

This book constitutes Part IV of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.

Bayesian Network Technologies - Applications and Graphical Models (Hardcover): Bayesian Network Technologies - Applications and Graphical Models (Hardcover)
R2,843 Discovery Miles 28 430 Ships in 10 - 15 working days

Bayesian networks are now being used in a variety of artificial intelligence applications. These networks are high-level representations of probability distributions over a set of variables that are used for building a model of the problem domain. ""Bayesian Network Technologies: Applications and Graphical Models"" provides an excellent and well-balanced collection of areas where Bayesian networks have been successfully applied. This book describes the underlying concepts of Bayesian Networks in an interesting manner with the help of diverse applications, and theories that prove Bayesian networks valid. ""Bayesian Network Technologies: Applications and Graphical Models"" provides specific examples of how Bayesian networks are powerful machine learning tools critical in solving real-life problems.

Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (Hardcover, 2013... Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (Hardcover, 2013 ed.)
Vinu V. Das
R5,721 Discovery Miles 57 210 Ships in 10 - 15 working days

Third International Conference on Recent Trends in Information, Telecommunication and Computing - ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.

Cyber-Physical Systems Security (Hardcover, 2018 ed.): Cetin Kaya Koc Cyber-Physical Systems Security (Hardcover, 2018 ed.)
Cetin Kaya Koc
R4,396 Discovery Miles 43 960 Ships in 10 - 15 working days

The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.

Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16') (Hardcover, 1st... Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16') (Hardcover, 1st ed. 2016)
V. Vijayakumar, V. Neelanarayanan
R5,726 Discovery Miles 57 260 Ships in 10 - 15 working days

This proceedings volume contains selected papers that were presented in the 3rd International Symposium on Big data and Cloud Computing Challenges, 2016 held at VIT University, India on March 10 and 11. New research issues, challenges and opportunities shaping the future agenda in the field of Big Data and Cloud Computing are identified and presented throughout the book, which is intended for researchers, scholars, students, software developers and practitioners working at the forefront in their field. This book acts as a platform for exchanging ideas, setting questions for discussion, and sharing the experience in Big Data and Cloud Computing domain.

Amazon Kinesis Data Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Data Streams Developer Guide (Hardcover)
Documentation Team
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days
Communication Networking - An Analytical Approach (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Communication Networking - An Analytical Approach (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R2,409 Discovery Miles 24 090 Ships in 12 - 19 working days

Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.

The Internet and Its Protocols - A Comparative Approach (Hardcover, New): Adrian Farrel The Internet and Its Protocols - A Comparative Approach (Hardcover, New)
Adrian Farrel
R1,662 Discovery Miles 16 620 Ships in 12 - 19 working days

The view presented in "The Internet and Its Protocols" is at once broad and deep. It covers all the common protocols and how they combine to create the Internet in its totality. More importantly, it describes each one completely, examining the requirements it addresses and the exact means by which it does its job. These descriptions include message flows, full message formats, and message exchanges for normal and error operation. They are supported by numerous diagrams and tables.
This book's comparative approach gives you something more valuable: insight into the decisions you face as you build and maintain your network, network device, or network application. Author Adrian Farrel s experience and advice will dramatically smooth your path as you work to offer improved performance and a wider range of services.
* Provides comprehensive, in-depth, and comparative coverage of the Internet Protocol (both IPv4 and IPv6) and its many related technologies.
* Written for developers, operators, and managers, and designed to be used as both an overview and a reference.
* Discusses major concepts in traffic engineering, providing detailed looks at MPLS and GMPLS and how they control both IP and non-IP traffic.
* Covers protocols for governing routing and transport, and for managing switches, components, and the network as a whole, along with higher-level application protocols.
* Offers thoughtful guidance on choosing between protocols, selecting features within a protocol, and other service- and performance-related decisions."

CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Wm.... CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Wm. Arthur Conklin, Daniel Shoemaker
R1,174 Discovery Miles 11 740 Ships in 12 - 19 working days

Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the exam CSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC) (R). Thoroughly revised and updated for the latest exam release, this guide includes real-world examples and comprehensive coverage on all aspects of application security within the entire software development lifecycle. It also includes hands-on exercises, chapter review summaries and notes, tips, and cautions that provide real-world insight and call out potentially harmful situations. With access to 350 exam questions online, you can practice either with full-length, timed mock exams or by creating your own custom quizzes by chapter or exam objective. CSSLP Certification All-in-One Exam Guide, Third Edition provides thorough coverage of all eight exam domains: Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation Programming Secure Software Testing Secure Lifecycle Management Software Deployment, Operations, and Maintenance Supply Chain and Software Acquisition

Video over Cognitive Radio Networks - When Quality of Service Meets Spectrum (Hardcover, 2014 ed.): Shiwen Mao Video over Cognitive Radio Networks - When Quality of Service Meets Spectrum (Hardcover, 2014 ed.)
Shiwen Mao
R4,000 R3,430 Discovery Miles 34 300 Save R570 (14%) Ships in 12 - 19 working days

This book focuses on the problem of video streaming over emerging cognitive radio (CR) networks. The book discusses the problems and techniques for scalable video streaming over cellular cognitive radio networks, ad hoc CR networks, cooperative CR networks, and femtocell CR networks. The authors formulate these problems and propose optimal algorithms to solve these problems. Also the book analyzes the proposed algorithms and validates the algorithms with simulations.

Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.): Francisco Rodriguez-henriquez, N. A. Saqib, Arturo... Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.)
Francisco Rodriguez-henriquez, N. A. Saqib, Arturo Diaz Perez, Cetin Kaya Koc
R5,311 Discovery Miles 53 110 Ships in 10 - 15 working days

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.): Ekram Hossain Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.)
Ekram Hossain
R2,961 Discovery Miles 29 610 Ships in 10 - 15 working days

Heterogeneous wireless networking, which is sometimes referred to as the fourth-generation (4G) wireless, is a new frontier in the future wireless communications technology and there has been a growing interest on this topic among researchers and engineers in both academia and industry. This book will include a set of research and survey articles featuring the recent advances in theory and applications of heterogeneous wireless networking technology for the next generation (e.g., fourth generation) wireless communications systems. With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third generation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile users in a seamless way. Fourth generation (4G) wireless systems are devised with the vision of heterogeneity in which a mobile user/device will be able to connect to multiple wireless networks (e.g., WLAN, cellular, WMAN) simultaneously. This book intends to provide a unified view on the state-of-the-art of protocols and architectures for heterogeneous wireless networking. The contributed articles will cover both the theoretical concepts and system-level implementation issues related to design, analysis, and optimization of architectures and protocols for heterogeneous wireless access networks.

Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.):... Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.)
Thomas Pfeffer
R2,876 Discovery Miles 28 760 Ships in 10 - 15 working days

The purpose of this volume is to shape conceptual tools to understand the impact of new information and communication technologies (ICTs) on the organization of universities. Traditional research-based universities, the most typical representatives of the higher education system, find themselves challenged by the speed and the wide range of technical innovations, but also by a vast array of implicit assumptions and explicit promises associated with the distribution of digital media.

The author observes that as universities increasingly use digital media (computers and the Internet) to accomplish their tasks, a transformation takes place in an "evolutionary" rather than in a revolutionary way.Using the University of Klagenfurt as an in-depth case study, he explores such dynamic issues as how digital media affect the practice of research, the preservation and dissemination of knowledge (for example, through publishing and archiving), and delivery of education at universities.More broadly, he considers issues of organizational culture and design, administration, and leadership as universities integrate digital technologies into all aspects of their operations."

An Ontology for Unconventional Conflict (Hardcover, 1st ed. 2018): Dean S. Hartley III An Ontology for Unconventional Conflict (Hardcover, 1st ed. 2018)
Dean S. Hartley III
R2,940 Discovery Miles 29 400 Ships in 10 - 15 working days

This book describes the ontology structure, types of actors, their potential actions, and ways that actions can affect the things that are part of the conflict. An ontology of unconventional conflict supports the understanding of unconventional conflict in general. It also provides a tool for understanding and investigating a particular unconventional conflict. The ontology specifies the relations among the elements and supports creating a description of a particular situation. Unconventional conflict spans the range from natural disasters through human disagreements to irregular warfare (up to conventional war). Unconventional conflict involves damage to things and injuries to people; however, the critical factors are the actions, reactions, and opinions of people, including political, military, economic, social, infrastructure, and information components. This ontology supports and will appeal to military strategists, political scientists, economists, and politicians in understanding their planning for, and managing of these conflicts.

Resource Allocation and MIMO for 4G and Beyond (Hardcover, 2014 ed.): Francisco Rodrigo Porto Cavalcanti Resource Allocation and MIMO for 4G and Beyond (Hardcover, 2014 ed.)
Francisco Rodrigo Porto Cavalcanti
R6,503 R5,293 Discovery Miles 52 930 Save R1,210 (19%) Ships in 12 - 19 working days

This book will be a comprehensive collection of advanced concepts related to 4th generation wireless communication systems. It will be divided into two main parts: resource allocation and transceiver architectures. These two research areas are at the core of the recent advances experimented by wireless communication systems. Each chapter will cover a relevant, timely, topic with two focuses: a first part which is of tutorial and survey nature, reviews the state of the art in that topic, followed by a more deep treatment including current research topics, case studies and performance analysis.

Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.): Terry L. Friesz Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.)
Terry L. Friesz
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems.

Configuring ISA Server 2004 (Paperback, 2nd ed): Thomas W. Shinder, Debra Littlejohn Shinder Configuring ISA Server 2004 (Paperback, 2nd ed)
Thomas W. Shinder, Debra Littlejohn Shinder; Edited by Martin Grasdal
R945 Discovery Miles 9 450 Ships in 12 - 19 working days

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
* This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations.
* Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities.
* Learn how to take advantage of ISA Server 2004's new VPN capabilities

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,529 Discovery Miles 65 290 Ships in 10 - 15 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition): Ian Foster, Carl Kesselman The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition)
Ian Foster, Carl Kesselman
R1,784 Discovery Miles 17 840 Ships in 12 - 19 working days

"The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge."
-From the Preface
In 1998, Ian Foster and Carl Kesselman introduced a whole new concept in computing with the first edition of this book. Today there is a broader and deeper understanding of the nature of the opportunities offered by Grid computing and the technologies needed to realize those opportunities. In Grid 2, the editors reveal the revolutionary impact of large-scale resource sharing and virtualization within science and industry, the intimate relationships between organization and resource sharing structures and the new technologies required to enable secure, reliable, and efficient resource sharing on large scale.
Foster and Kesselman have once again assembled a team of experts to present an up-to-date view of Grids that reports on real experiences and explains the available technologies and new technologies emerging from labs, companies and standards bodies. Grid 2, like its predecessor, serves as a manifesto, design blueprint, user guide and research agenda for future Grid systems.
*30 chapters including more than a dozen completely new chapters.
*Web access to 13 unchanged chapters from the first edition.
*Three personal essays by influential thinkers on the significance of Grids from the perspectives of infrastructure, industry, and science.
*A foundational overview of the central Grid concepts and architectural principles.
*Twelve application vignettes showcase working Grids in science, engineering, industry, and commerce.
*Detailed discussions of core architecture and services, data and knowledge management, and higher-level tools.
*Focused presentations on production Grid deployment, computing platforms, peer-to-peer technologies, and network infrastructures.
*Extensive bibliography and glossary.

Steiner Trees in Industry (Hardcover, 2001 ed.): Xiuzhen Cheng, Dingzhu Du Steiner Trees in Industry (Hardcover, 2001 ed.)
Xiuzhen Cheng, Dingzhu Du
R5,881 Discovery Miles 58 810 Ships in 10 - 15 working days

This book is a collection of articles studying various Steiner tree prob lems with applications in industries, such as the design of electronic cir cuits, computer networking, telecommunication, and perfect phylogeny. The Steiner tree problem was initiated in the Euclidean plane. Given a set of points in the Euclidean plane, the shortest network interconnect ing the points in the set is called the Steiner minimum tree. The Steiner minimum tree may contain some vertices which are not the given points. Those vertices are called Steiner points while the given points are called terminals. The shortest network for three terminals was first studied by Fermat (1601-1665). Fermat proposed the problem of finding a point to minimize the total distance from it to three terminals in the Euclidean plane. The direct generalization is to find a point to minimize the total distance from it to n terminals, which is still called the Fermat problem today. The Steiner minimum tree problem is an indirect generalization. Schreiber in 1986 found that this generalization (i.e., the Steiner mini mum tree) was first proposed by Gauss."

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,981 Discovery Miles 29 810 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018):... Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018)
Sergei Petrenko
R4,129 Discovery Miles 41 290 Ships in 10 - 15 working days

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.

Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.): Hussein T. Mouftah, Pin-Han Ho Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.)
Hussein T. Mouftah, Pin-Han Ho
R4,387 Discovery Miles 43 870 Ships in 10 - 15 working days

Optical Networks - Architecture and Survivability, is a state-of-the-art work on survivable and cost-effective design of control and management for networks with IP directly over Wavelength Division Multiplexing (WDM) technology (or called Optical Internet). The authors address issues of signaling mechanisms, resource reservation, and survivable routing and wavelength assignment. Special emphasis has been given to the design of meshed, middle-sized, and wavelength-routed networks with dynamic traffic in the optical domain, such as the next-generation Metropolitan Area Network.

Research and development engineers, graduate students studying wavelength-routed WDM networks, and senior undergraduate students with a background in algorithms and networking will find this book interesting and useful. This work may also be used as supplemental readings for graduate courses on internetworking, routing, survivability, and network planning algorithms.

Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017): Constandinos X. Mavromoustakis, George... Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017)
Constandinos X. Mavromoustakis, George Mastorakis, Ciprian Dobre
R5,435 Discovery Miles 54 350 Ships in 12 - 19 working days

This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

The Web Application Hacker's Handbook: Finding and  Exploiting Security Flaws 2e (Paperback, 2nd Edition): D Stuttard The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2e (Paperback, 2nd Edition)
D Stuttard
R1,354 R1,111 Discovery Miles 11 110 Save R243 (18%) Ships in 12 - 19 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
AWS Certificate Manager User Guide
Documentation Team Hardcover R980 Discovery Miles 9 800
The Gathering Cloud
J. R. Carpenter Paperback R421 Discovery Miles 4 210
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R524 Discovery Miles 5 240
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R3,056 Discovery Miles 30 560
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320

 

Partners