0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (352)
  • R250 - R500 (931)
  • R500+ (15,838)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.):... Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.)
Vasily Popovich, Christophe Claramunt, Manfred Schrenk, Kyrill Korolenko
R4,703 R3,492 Discovery Miles 34 920 Save R1,211 (26%) Ships in 12 - 17 working days

The Workshop Proceedings reflect problems of advanced geo-information science with a special emphasis on environmental and urban challenges. The Proceedings incorporate papers presented by leading scientists doing research on environmental issues from modeling to analysis, information processing and visualization. As well as practitioners engaged in GIS and GIS applications development. The Proceedings pay close attention to the problems of scientific and technological innovations as well application opportunities such as getting environmental and global warming problems under control, as well as the monitoring, planning and simulation of urban systems with respect to economic trends as related to: Artificial intelligence; GIS ontologies; GIS data integration and modeling; Environmental management ; Urban GIS; Transportation GIS; GIS data fusion; GIS and corporate information systems; GIS and real-time monitoring systems; GIS algorithms and computational issues; Landscape studies; Global warming; GIS and the Arctic sea; Novel and emerging GIS research areas; Maritime and environmental GIS; and Coastal GIS.

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,820 Discovery Miles 48 200 Ships in 10 - 15 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.): Jean-Marc Adamo Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.)
Jean-Marc Adamo
R4,341 Discovery Miles 43 410 Ships in 10 - 15 working days

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library presents ARCH, a library built as an extension to MPI. ARCH relies on a small set of programming abstractions that allow the writing of well-structured multi-threaded parallel codes according to the object-oriented programming style. ARCH has been written with C++. The book describes the built-in classes, and illustrates their use through several template application cases in several fields of interest: Distributed Algorithms (global completion detection, distributed process serialization), Parallel Combinatorial Optimization (A* procedure), Parallel Image-Processing (segmentation by region growing). It shows how new application-level distributed data types - such as a distributed tree and a distributed graph - can be derived from the built-in classes. A feature of interest to readers is that both the library and the application codes used for illustration purposes are available via the Internet. The material can be downloaded for installation and personal parallel code development on the reader's computer system. ARCH can be run on Unix/Linux as well as Windows NT-based platforms. Current installations include the IBM-SP2, the CRAY-T3E, the Intel Paragon, PC-networks under Linux or Windows NT. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is aimed at scientists who need to implement parallel/distributed algorithms requiring complicated local and/or distributed control structures. It can also benefit parallel/distributed program developers who wish to write codes in the object-oriented style. The author has been using ARCH for several years as a medium to teach parallel and network programming. Teachers can employ the library for the same purpose while students can use it for training. Although ARCH has been used so far in an academic environment, it will be an effective tool for professionals as well. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is suitable as a secondary text for a graduate level course on Data Communications and Networks, Programming Languages, Algorithms and Computational Theory and Distributed Computing and as a reference for researchers and practitioners in industry.

Blockchain Security from the Bottom Up: Securing a nd Preventing Attacks on Cryptocurrencies, Decentr alized Applications,... Blockchain Security from the Bottom Up: Securing a nd Preventing Attacks on Cryptocurrencies, Decentr alized Applications, NFTs, and Smart Contracts (Paperback)
HE Poston
R668 R468 Discovery Miles 4 680 Save R200 (30%) Ships in 9 - 15 working days

The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution. You'll also find: Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work A can't-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations.

Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995... Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995 (Hardcover, 1995 ed.)
A.S. Sethi, Y. Raynaud, F. Faure-Vincent
R8,473 Discovery Miles 84 730 Ships in 12 - 17 working days

Integrated network management plays a pivotal role in establishing and maintaining an efficient worldwide information infrastructure. This volume presents a state-of-the-art review of the latest worldwide research results covering this topic. The book contains the selected proceedings of the fourth International Symposium on Integrated Network Management, arranged by the International Federation for Information Processing and jointly sponsored by the IEEE. The Symposium was held in Santa Barbara, California, May 1995.

Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover): Dimitris N Chorafas Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover)
Dimitris N Chorafas
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

This book addresses the changing role of networks and the evolving structure of an Infrastructure Superhighway. The requirements for leadership in telecommunications are reviewed from different viewpoints: Network operators, equipment manufacturers, software developers and user organizations. Emphasis is placed on multimedia and what multimedia solutions would mean to telephone utilities and endusers. Based on extensive research undertaken in Europe, US and Japan, Dimitris Chorafas identifies new domains of applications, presents the breakthroughs which have currently been achieved and outlines the systems solutions necessary to fruitfully exploit new technology.

Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.):... Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.)
Ghazi Ben Ayed
R3,987 R3,340 Discovery Miles 33 400 Save R647 (16%) Ships in 12 - 17 working days

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Corporate Computer Security, Global Edition (Paperback, 4th edition): Randall Boyle, Raymond Panko Corporate Computer Security, Global Edition (Paperback, 4th edition)
Randall Boyle, Raymond Panko
R2,398 Discovery Miles 23 980 Ships in 12 - 17 working days

For introductory courses in IT Security. A strong business focus through a solid technical presentation of security tools. Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies. This program will provide a better teaching and learning experience-for you and your students. Here's how: *Encourage Student's to Apply Concepts: Each chapter now contains new hands-on projects that use contemporary software. *Business Environment Focus: This edition includes more of a focus on the business applications of the concepts. Emphasis has been placed on securing corporate information systems, rather than just hosts in general. *Keep Your Course Current and Relevant: New examples, exercises, and research findings appear throughout the text.

Electronic Value Exchange - Origins of the VISA Electronic Payment System (Hardcover, 2011 ed.): David L. Stearns Electronic Value Exchange - Origins of the VISA Electronic Payment System (Hardcover, 2011 ed.)
David L. Stearns
R4,700 Discovery Miles 47 000 Ships in 12 - 17 working days

"Electronic Value Exchange" examines in detail the transformation of the VISA electronic payment system from a collection of non-integrated, localized, paper-based bank credit card programs into the cooperative, global, electronic value exchange network it is today. Topics and features: provides a history of the VISA system from the mid-1960s to the early 1980s; presents a historical narrative based on research gathered from personal documents and interviews with key actors; investigates, for the first time, both the technological and social infrastructures necessary for the VISA system to operate; supplies a detailed case study, highlighting the mutual shaping of technology and social relations, and the influence that earlier information processing practices have on the way firms adopt computers and telecommunications; examines how "gateways" in transactional networks can reinforce or undermine established social boundaries, and reviews the establishment of trust in new payment devices."

Managing Business and Service Networks (Hardcover, 2001 ed.): Lundy Lewis Managing Business and Service Networks (Hardcover, 2001 ed.)
Lundy Lewis
R4,464 Discovery Miles 44 640 Ships in 12 - 17 working days

Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds, our bodies, our love lives, our businesses, our forests, our countries, etc. Sometimes we don't call it "management" per se. We seldom talk about managing our minds or automobiles. But if we think of management in terms of monitoring, maintaining, and cultivating with respect to some goal, then it makes sense. We certainly monitor an automobile, albeit unconsciously, to make sure that it doesn't exhibit signs of trouble. And we certainly try to cultivate our minds. This book is about managing networks. That itself is not a new concept. We've been managing the networks that support our telephones for about 100 years, and we've been managing the networks that support our computers for about 20 years. What is new (and what motivated me to write this book) is the following: (i) the enormous advancements in networking technology as we transition th st from the 20 century to the 21 century, (ii) the increasing dependence of human activities on networking technology, and (iii) the commercialization of services that depend on networking technology (e.g., email and electronic commerce).

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion,... Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
R2,909 Discovery Miles 29 090 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,351 Discovery Miles 43 510 Ships in 10 - 15 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.): David A. Elizondo, Agusti Solanas, Antoni... Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.)
David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste
R4,251 Discovery Miles 42 510 Ships in 10 - 15 working days

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Multimedia Security - Algorithm Development, Analysis and Applications (Hardcover, 1st ed. 2021): Kaiser J. Giri, Shabir Ahmad... Multimedia Security - Algorithm Development, Analysis and Applications (Hardcover, 1st ed. 2021)
Kaiser J. Giri, Shabir Ahmad Parah, Rumaan Bashir, Khan Muhammad
R4,985 Discovery Miles 49 850 Ships in 10 - 15 working days

This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.

High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.): Ahmed N. Tantawy High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.)
Ahmed N. Tantawy
R4,365 Discovery Miles 43 650 Ships in 10 - 15 working days

'The world of information processing is going through a major phase of its evolution. Networking has been associated with computers since the 1960's. Communicating machines, exchanging information or cooperating to solve complex problems, were the dream of many scientists and engineers. Rudi mentary networks and protocols were invented. Local area networks capable of carrying a few megabits per second became basic components of corporate computing installations in the 1980's. At the same time, advances in optical transmission and switching technologies made it possible to transfer billions of bits per second. 'The availability of this huge bandwidth is making people wonder about the seemingly unlimited possibilities of these "fat information pipes" A new world where all interesting up-to-date information becomes instantaneously available to everyone everywhere is often portrayed to be around the comer. New applications are envisioned and their requirements are defined. 'The new field of High Performance Networking is burgeoning with activities at various levels. Several frontiers are being explored simultaneously. In order to achieve more bandwidth and better performance, work is progressing in optical transmission, high speed switching and network resource manage ment. Some researchers have started to investigate all-optical networking as a promising approach to remove the relatively slow electronics from the network infrastructure. This will also introduce a new environment with unique characteristics that will have a definite impact on network architec tures, topologies, addressing schemes, and protocols."

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,200 Discovery Miles 22 000 Ships in 10 - 15 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.): Andre Girard, Brunilde... Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.)
Andre Girard, Brunilde Sanso, Felida Vazquez-Abad
R3,010 Discovery Miles 30 100 Ships in 10 - 15 working days

With the ever increasing growth of services and the corresponding demand for Quality of Service requirements that are placed on IP-based networks, the essential aspects of network planning will be critical in the coming years. A wide number of problems must be faced in order for the next generation of IP networks to meet their expected performance. With Performance Evaluation and Planning Methods for the Next Generation Internet, the editors have prepared a volume that outlines and illustrates these developing trends.

A number of the problems examined and analyzed in the book are:

-The design of IP networks and guaranteed performance

-Performances of virtual private networks

-Network design and reliability

-The issues of pricing, routing and the management of QoS

-Design problems arising from wireless networks

-Controlling network congestion

-New applications spawned from Internet use

-Several new models are introduced that will lead to better Internet performance

These are a few of the problem areas addressed in the book and only a selective example of some of the coming key areas in networks requiring performance evaluation and network planning.

Mobile Information Systems - IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS) 15-17 September 2004, Oslo,... Mobile Information Systems - IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS) 15-17 September 2004, Oslo, Norway (Hardcover, 2005 ed.)
Elaine Lawrence, Barbara Pernici, John Krogstie
R4,436 Discovery Miles 44 360 Ships in 10 - 15 working days

Mobility is perhaps the most important market and technological trend within information and communication technology. With the advent of new mobile infrastructures providing higher bandwidth and constant connection to the network from virtually everywhere, the way people use information resources is predicted to be radically transformed. Over the last years, a new breed of information systems, referred to as mCommerce systems or mobile information systems, has appeared to address this emerging situation. In 2000, the IFIP 8.1 WG decided to look into establishing a task group to look closer at this area, and the idea was adopted and extended by IFIP TC8 the following year. After the arrangement of several workshop, this task group has been the driving force behind the arrangement of MOBIS (IFIP TC 8 Working Conference on Mobile Information systems) held in Oslo, Norway, 15-17 September 2004. The objective of the working conference was to provide a forum for researchers and practitioners interested in planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems to meet, and exchange research ideas and results. Specifically, we tried to use the working conference to * Clarify differences and similarities between the development of mobile vs. more traditional information systems * Investigate organizational impact of mobile information systems * Investigate mobile commerce applications combined with the advantages of mobile communications technologies X Mobile Information Systems * Evaluate existing and newly developed approaches for analysis, design, implementation, and evolution of mobile information systems.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,795 Discovery Miles 27 950 Ships in 10 - 15 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Agent-Based Service-Oriented Computing (Hardcover, 2010 Ed.): Nathan Griffiths, Kuo-Ming Chao Agent-Based Service-Oriented Computing (Hardcover, 2010 Ed.)
Nathan Griffiths, Kuo-Ming Chao
R2,953 Discovery Miles 29 530 Ships in 10 - 15 working days

Service-Oriented Computing (SOC) allows software development time to be shortened by the composition of existing services across the Internet. Further exploitation of this revolutionary trend is feasible through automation, thanks to the use of software agents and techniques from distributed artificial intelligence.

This book provides an overview of the related technologies and insight into state-of-the art research results in the field. The topics discussed cover the various stages in the life cycle of service-oriented software development using agent technologies to automate the development process and to manage services in a dynamic environment. The book presents both academic research results and the latest developments from industry.

Researchers from academia and industry, as well as postgraduates, will find this cutting-edge volume indispensable in order to gain understanding of the issues associated with agent-based service-oriented computing along with recent, and likely future technology trends.

WDM Mesh Networks - Management and Survivability (Hardcover, 2003 ed.): Hui Zang WDM Mesh Networks - Management and Survivability (Hardcover, 2003 ed.)
Hui Zang
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

In recent years, with the rapid growth of the Internet, the bandwidth demand for data traffic is exploding. Optical networks based on wavelength-division multiplexing (WDM) technology offer the promise to satisfy the bandwidth requirements of the Internet infrastructure. With WDM technology, signals are carried simultaneously on mUltiple wavelengths on a single fiber. WDM provides a practical approach of resolving the mismatch between the fiber ca pacity and the peak electronic processing speed. Mesh-based WDM networks have recently attracted much research and development interest since the In ternet topology is meshed in nature, and more importantly, mesh-based WDM networks are flexible with respect to routing and survivability. This book exam ines the management and survivability issues of mesh-based WDM networks and proposes new WDM network protocols and algorithms that could make telecommunication networks more efficient. Wavelength-routing has been one of the most important technologies to em ploy WDM in backbone networks. In wavelength-routed WDM networks, optical channels, which are referred to as lightpaths, are set up between WDM terminals. Most chapters of this bock are focused on various issues related to wavelength-routed networks, namely, routing and wavelength-assignment, con trol and management, fault management, and wavelength-converter placement. This book also presents an all-optical packet-switched network architecture based on the concept of photonic slot routing. The audience for this book are network designers and planners, research and development engineers active in the field of telecommunications, and students of optical networking at the graduate or senior undergraduate levels."

High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.): Ahmed N. Tantawy High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.)
Ahmed N. Tantawy
R4,367 Discovery Miles 43 670 Ships in 10 - 15 working days

In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.

IP Network-based Multi-agent Systems for Industrial Automation - Information Management, Condition Monitoring and Control of... IP Network-based Multi-agent Systems for Industrial Automation - Information Management, Condition Monitoring and Control of Power Systems (Hardcover, 2007 ed.)
David P. Buse, Q.-H. Wu
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

A mobile agent is a software program with the capability to suspend its execution and resume it on another computer. Agents are a relatively recent development in computer science, which have become a popular and useful methodology for the modelling and implementation of distributed systems, particularly those consisting of a number of largely autonomous components. The extensive use of multi-agent systems in various areas including information management, industrial control and manufacturing systems, suggests that the multi-agent systems methodology may also be appropriate for the design of power system automation systems.

IP Network-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems is the first book to present an introduction to the use of the Internet protocol suite and multi-agent systems for the information management, online monitoring and control of distributed power system substations. It proposes an open architecture for information management and control, based on the concepts of multi-agent systems and mobile agents. In this book, mobile agents are applied to the retrieval and analysis of substation data, and to remote operator intervention. This book also describes a prototype implementation of the architecture, in the form of a substation information management system, which has been demonstrated and evaluated using a substation simulator. The architecture is also evaluated theoretically with respect to its performance, modifiability, functionality and reliability.

As mobile agent technologies are in the early stages the real applications of these technologies are rare; IPNetwork-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems will be an excellent reference for postgraduates, researchers and academics in engineering and computer science, as well as engineers in system automation and managers in distributed industrial systems.

Peer to Peer Computing - The Evolution of a Disruptive Technology (Hardcover, New): Ramesh Subramanian, Brian D Goodman Peer to Peer Computing - The Evolution of a Disruptive Technology (Hardcover, New)
Ramesh Subramanian, Brian D Goodman
R2,483 Discovery Miles 24 830 Ships in 12 - 17 working days

Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications.

Applied Ontology Engineering in Cloud Services, Networks and Management Systems (Hardcover, 2012): J. Martin Serrano Applied Ontology Engineering in Cloud Services, Networks and Management Systems (Hardcover, 2012)
J. Martin Serrano
R2,799 Discovery Miles 27 990 Ships in 10 - 15 working days

Metadata standards in today's ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems.

Engineering and computer science professionals (infrastructure architects, software developers, service designers, infrastructure operators, engineers, etc.) are today confronted as never before with the challenge of convergence in software solutions and technology. This book will help them respond creatively to what is sure to be a period of rapid development.

"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Little Bird Of Auschwitz - How My Mother…
Alina Peretti, Jacques Peretti Paperback R453 R370 Discovery Miles 3 700
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R718 Discovery Miles 7 180
Women In Solitary - Inside The Female…
Shanthini Naidoo Paperback  (1)
R355 R305 Discovery Miles 3 050
Lydia - Anthem To The Unity Of Women
Kally Forrest Paperback R300 R220 Discovery Miles 2 200
Fighting For The Dream
R.W. Johnson Paperback  (3)
R364 Discovery Miles 3 640
Stellenbosch: Murder Town - Two Decades…
Julian Jansen Paperback R335 R288 Discovery Miles 2 880
Impossible Return - Cape Town's Forced…
Siona O' Connell Paperback R335 R288 Discovery Miles 2 880
Killing Karoline - A Memoir
Sara-Jayne King Paperback  (1)
R325 R279 Discovery Miles 2 790
The Lie Of 1652 - A Decolonised History…
Patric Mellet Paperback  (7)
R365 R314 Discovery Miles 3 140
Tales Of Two Countries - An Insightful…
Ray Dearlove Paperback R375 R275 Discovery Miles 2 750

 

Partners