0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (357)
  • R250 - R500 (928)
  • R500+ (14,076)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Collective Intelligence and E-learning 2.0 - Implications of Web-based Communities and Networking (Hardcover): Harrison Hao... Collective Intelligence and E-learning 2.0 - Implications of Web-based Communities and Networking (Hardcover)
Harrison Hao Yang, Steve Chi-Yin Yuen
R4,845 Discovery Miles 48 450 Ships in 10 - 15 working days

With the advent of Web 2.0, e-learning has the potential to become far more personal, social, and flexible. ""Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking"" provides a valuable reference to the latest advancements in the area of educational technology and e-learning. This innovative collection includes a selection of world-class chapters addressing current research, case studies, best practices, pedagogical approaches, and strategies related to e-learning resources and projects.

High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.): Klaus Schmidt High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.)
Klaus Schmidt
R2,250 R1,668 Discovery Miles 16 680 Save R582 (26%) Ships in 12 - 17 working days

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business Continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. "High Availability and Disaster Recovery" are contributions of the IT to fulfill this requirement. And companies will be confronted with such demands to an even greater extent in the future, since their credit ratings will be lower without such precautions. Both, "High Availability and Disaster Recovery," are realized by redundant systems. Redundancy can and should be implemented on different abstraction levels: from the hardware, the operating system and middleware components up to the backup computing center in case of a disaster. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux Systems.

Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.): Heike Emmerich, Britta Nestler, Michael... Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.)
Heike Emmerich, Britta Nestler, Michael Schreckenberg
R4,321 Discovery Miles 43 210 Ships in 10 - 15 working days

An overview of the recent progress of research in computational physics and materials science. Particular topics are modelling of traffic flow and complex multi-scale solidification phenomena. The sections introduce novel research results of experts from a considerable diversity of disciplines such as physics, mathematical and computational modelling, nonlinear dynamics, materials sciences, statistical mechanics and foundry technique. The book intends to create a comprehensive and coherent image of the current research status and illustrates new simulation results of transport and interface dynamics by high resolution graphics. Various possible perspectives are formulated for future activities. Special emphasis is laid on exchanging experiences concerning numerical tools and on the bridging of the scales as is necessary in a variety of scientific and engineering applications. An interesting possibility along this line was the coupling of different computational approaches leading to hybrid simulations.

Medical Data Privacy Handbook (Hardcover, 1st ed. 2015): Aris Gkoulalas-Divanis, Grigorios Loukides Medical Data Privacy Handbook (Hardcover, 1st ed. 2015)
Aris Gkoulalas-Divanis, Grigorios Loukides
R7,547 Discovery Miles 75 470 Ships in 10 - 15 working days

This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors' comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.

Research Advances in Cloud Computing (Hardcover, 1st ed. 2017): Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya Research Advances in Cloud Computing (Hardcover, 1st ed. 2017)
Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya
R3,637 Discovery Miles 36 370 Ships in 10 - 15 working days

This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. The move to cloud computing is no longer merely a topic of discussion; it has become a core competency that every modern business needs to embrace and excel at. It has changed the way enterprise and internet computing is viewed, and this success story is the result of the long-term efforts of computing research community around the globe. It is predicted that by 2026 more than two-thirds of all enterprises across the globe will be entirely run in cloud. These predictions have led to huge levels of funding for research and development in cloud computing and related technologies. Accordingly, universities across the globe have incorporated cloud computing and its related technologies in their curriculum, and information technology (IT) organizations are accelerating their skill-set evolution in order to be better prepared to manage emerging technologies and public expectations of the cloud, such as new services.

Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.): Radhika Ranjan Roy Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.)
Radhika Ranjan Roy
R8,571 Discovery Miles 85 710 Ships in 12 - 17 working days

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book.

"Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

Internet E-Mail - Protocols, Standards, and Implementation (Hardcover): Lawrence Hughes Internet E-Mail - Protocols, Standards, and Implementation (Hardcover)
Lawrence Hughes
R3,429 Discovery Miles 34 290 Ships in 10 - 15 working days

Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.

Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition): Peter Kacsuk, Thomas... Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R4,242 Discovery Miles 42 420 Ships in 10 - 15 working days

From Cluster to Grid Computing is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. Distributed and Parallel Systems: From Cluster to Grid Computing is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable for advanced-level students in computer science.

Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and... Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23-25, 2002, Paris, France (Hardcover, 2003 ed.)
Dominique Gaiti, Nadia Boukhatem
R2,877 Discovery Miles 28 770 Ships in 10 - 15 working days

Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks.
One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering.
The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed.
This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.

Enterprise Interoperability II - New Challenges and Approaches (Hardcover, 2007 ed.): Ricardo Jardim-Goncalves, Joerg Muller,... Enterprise Interoperability II - New Challenges and Approaches (Hardcover, 2007 ed.)
Ricardo Jardim-Goncalves, Joerg Muller, Kai Mertins, Martin Zelm
R8,279 Discovery Miles 82 790 Ships in 10 - 15 working days

This volume provides a concise reference to the state-of-the-art in software interoperability. Composed of over 90 papers, Enterprise Interoperability II ranges from academic research through case studies to industrial and administrative experience of interoperability. The international nature of the authorship continues to broaden. Many of the papers have examples and illustrations calculated to deepen understanding and generate new ideas.

Standards and Innovations in Information Technology and Communications (Hardcover, 1st ed. 2020): Dina Simunic, Ivica Pavic Standards and Innovations in Information Technology and Communications (Hardcover, 1st ed. 2020)
Dina Simunic, Ivica Pavic
bundle available
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

This book gives a thorough explanation of standardization, its processes, its life cycle, and its related organization on a national, regional and global level. The book provides readers with an insight in the interaction cycle between standardization organizations, government, industry, and consumers. The readers can gain a clear insight to standardization and innovation process, standards, and innovations life-cycle and the related organizations with all presented material in the field of information and communications technologies. The book introduces the reader to understand perpetual play of standards and innovation cycle, as the basis for the modern world.

Ethics and Human Behaviour in ICT Development - International Case Studies with a Focus on Poland (Hardcover, 1st ed. 2023):... Ethics and Human Behaviour in ICT Development - International Case Studies with a Focus on Poland (Hardcover, 1st ed. 2023)
Marion Hersh, Józef B. Lewoc
bundle available
R3,502 Discovery Miles 35 020 Ships in 10 - 15 working days

Ethics and Human Behaviour in ICT Development discusses ethics in a professional context and encourages readers to self-assessment of their own behaviour. It provides thought-provoking accounts of the little-known early history of technological development in information and communication technology (ICT) and the automation industry in Poland, with a focus on Wroclaw. The book provides a framework for understanding the relationship between ethics and behaviour, and analyses critically ethical and behavioural issues in challenging workplaces and social contexts. It includes: case studies from around the world, especially Poland, which illustrate the relationships between human behaviour and ethics; biographies of successful Polish ICT and automation leading designers; analysis of case studies of human behaviour and ethics in challenging industrial development and other environments; and illustrative practical applications alongside the theory of human behaviour and ethics. The authors demonstrate the ingenuity of the early Polish designers, programmers and other specialists in overcoming the shortage of components caused by import embargoes to enable Poland to develop its own computer industry. An example of this is Elwro, formerly the largest manufacturer of computers in Poland. The discussion of its growth illustrates the potential of human creativity to overcome problems. The discussion of its fall highlights the importance of ethical approaches to technology transfer and the dangers of a colonialist mentality. The book is designed for engineers, computer scientists, researchers and professionals alike, as well as being of interest for those broadly concerned with ethics and human behaviour.

Cyber Security in Business and Management (Hardcover): Stephen Mason Cyber Security in Business and Management (Hardcover)
Stephen Mason
R3,317 R2,914 Discovery Miles 29 140 Save R403 (12%) Ships in 10 - 15 working days
Data Communications and Networking: Volume II (Hardcover): Michel Levine Data Communications and Networking: Volume II (Hardcover)
Michel Levine
R2,991 Discovery Miles 29 910 Ships in 12 - 17 working days
Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017): Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017)
Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang
R2,724 R1,913 Discovery Miles 19 130 Save R811 (30%) Ships in 12 - 17 working days

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

Next Generation Intelligent Optical Networks - From Access to Backbone (Hardcover, Approx. 368p. T): Stamatios Kartalopoulos Next Generation Intelligent Optical Networks - From Access to Backbone (Hardcover, Approx. 368p. T)
Stamatios Kartalopoulos
R2,851 Discovery Miles 28 510 Ships in 10 - 15 working days

Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica ?ber with a single wavelength modulated at low data rates, it was quickly demonstrated that ?ber can deliver much more bandwidth than any other transmission medium, twisted pair wire, coaxial cable, or wireless. Since then, the optical network evolved to include more exciting technologies, gratings, optical ?lters, optical multiplexers, and optical ampli?ers so that today a single ?ber can transport an unprecedented aggregate data rate that exceeds Tbps, and this is not the upper limit yet. Thus, the ?ber optic network has been the network of choice, and it is expected to remain so for many generationsto come, for both synchronousand asynchronouspayloads; voice, data, video, interactive video, games, music, text, and more. In the last few years, we have also witnessed an increase in network attacks as a result of store andforwardcomputer-basednodes. These attackshave manymaliciousobjectives: harvestsomeone else's data, impersonate another user, cause denial of service, destroy ?les, and more. As a result, a new ?eld in communicationis becomingimportant, communicationnetworksand informationse- rity. In fact, the network architect and system designer is currently challenged to include enhanced features such as intruder detection, service restoration and countermeasures, intruder avoidance, and so on. In all, the next generation optical network is intelligent and able to detect and outsmart malicious intruders.

Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.): Stefan Mangard, Elisabeth Oswald, Thomas... Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.)
Stefan Mangard, Elisabeth Oswald, Thomas Popp
R5,101 Discovery Miles 51 010 Ships in 12 - 17 working days

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles.

By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for advanced-level students, and researchers working in information security.

Semantic Grid: Model, Methodology, and Applications (Hardcover, 2008 ed.): Zhaohui Wu, Huajun Chen Semantic Grid: Model, Methodology, and Applications (Hardcover, 2008 ed.)
Zhaohui Wu, Huajun Chen
R4,242 Discovery Miles 42 420 Ships in 10 - 15 working days

Semantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. First, scientific issues of semantic grid systems are covered, followed by two basic technical issues, data-level semantic mapping, and service-level semantic interoperating. Two killer applications are then introduced to show how to build a semantic grid for specific application domains. Although this book is organized in a step by step manner, each chapter is independent. Detailed application scenarios are also presented. In 1990, Prof. Wu invented the first KB-system tool, ZIPE, based on C on a SUN platform. He proposed the first coupling knowledge representing model, Couplingua, which embodies Rule, Frame, Semantic Network and Nerve Cell Network, and supports symbol computing and data processing computing. His current focus is on semantic web, grid & ubiquitous computing, and their applications in the life sciences.

Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Hardcover, 2001 ed.): Myungchul Kim, Byoungmoon Chin,... Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Hardcover, 2001 ed.)
Myungchul Kim, Byoungmoon Chin, Sungwon Kang, Danhyung Lee
R5,702 Discovery Miles 57 020 Ships in 10 - 15 working days

FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for Distributed Systems and Communication Protocols) and PSTV (Protocol Specification, Testing and Verification) conferences. This year the conference has a new name FORTE (Formal Techniques for Networked and Distributed Systems). The previous FORTE began in 1989 and the PSTV conference in 1981. Therefore the new FORTE conference actually has a long history of 21 years. The purpose of this conference is to introduce theories and formal techniques applicable to various engineering stages of networked and distributed systems and to share applications and experiences of them. This FORTE 2001 conference proceedings contains 24 refereed papers and 4 invited papers on the subjects. We regret that many good papers submitted could not be published in this volume due to the lack of space. FORTE 2001 was organized under the auspices of IFIP WG 6.1 by Information and Communications University of Korea. It was financially supported by Ministry of Information and Communication of Korea. We would like to thank every author who submitted a paper to FORTE 2001 and thank the reviewers who generously spent their time on reviewing. Special thanks are due to the reviewers who kindly conducted additional reviews for rigorous review process within a very short time frame. We would like to thank Prof. Guy Leduc, the chairman of IFIP WG 6.1, who made valuable suggestions and shared his experiences for conference organization.

A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover): Mitch Seymour A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover)
Mitch Seymour; Illustrated by Mitch Seymour, Elyse Seymour
R587 Discovery Miles 5 870 Ships in 10 - 15 working days
Communication-Based Systems - Proceeding of the 3rd International Workshop held at the TU Berlin, Germany, 31 March - 1 April... Communication-Based Systems - Proceeding of the 3rd International Workshop held at the TU Berlin, Germany, 31 March - 1 April 2000 (Hardcover, 2000 ed.)
Gunter Hommel
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

Since 1990 the German Research Society (Deutsche Forschungsgemeinschaft, DFG) has been funding PhD courses (Graduiertenkollegs) at selected universi- ties in the Federal Republic of Germany. TU Berlin has been one of the first universities joining that new funding program of DFG. The PhD courses have been funded over aperiod of 9 years. The grant for the nine years sums up to approximately 5 million DM. Our Grnduiertenkolleg on Communication-based Systems has been assigned to the Computer Science Department of TU Berlin although it is a joined effort of all three universities in Berlin, Technische Uni- versitat (TU), Freie Universitat (FU), and Humboldt Universitat (HU). The Graduiertenkolleg has been started its program in October 1991. The professors responsible for the program are: Hartmut Ehrig (TU), Gunter Hommel (TU), Stefan Jahnichen (TU), Peter Lohr (FU), Miroslaw Malek (RU), Peter Pep- per (TU), Radu Popescu-Zeletin (TU), Herbert Weber (TU), and Adam Wolisz (TU). The Graduiertenkolleg is a PhD program for highly qualified persons in the field of computer science. Twenty scholarships have been granted to fellows of the Graduiertenkolleg for a maximal period of three years. During this time the fellows take part in a selected educational program and work on their PhD thesis.

Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.): Denis Royer Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.)
Denis Royer
bundle available
R3,385 Discovery Miles 33 850 Ships in 12 - 17 working days

The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented.

Collaborative and Distributed E-Research - Innovations in Technologies, Strategies, and Applications (Hardcover, New): Angel A... Collaborative and Distributed E-Research - Innovations in Technologies, Strategies, and Applications (Hardcover, New)
Angel A Juan, Thanasis Daradoumis, Meritxell Roca, Scott E. Grasman, Javier Faulin
R5,246 Discovery Miles 52 460 Ships in 10 - 15 working days

Technology has made it possible to conduct research and form research groups that are not limited by geographic location. The field of Collaborative and Distributed E-Research (CDER) studies this phenomenon, specifically focusing on the use of the Internet and Information Technology (IT) to develop international and distributed scientific research. Collaborative and Distributed E-Research: Innovations in Technologies, Strategies and Applications offers insight into practical and methodological issues related to collaborative e-research and furthers our understanding of current and future trends in online research and the types of technologies involved. This book provides a useful foundation for academics and professionals involved in Collaborative and Distributed E-Research, collaborative software development, and computer-supported collaborative work.

Networks and Systems Management - Platforms Analysis and Evaluation (Hardcover, 1997 ed.): Iosif G. Ghetie Networks and Systems Management - Platforms Analysis and Evaluation (Hardcover, 1997 ed.)
Iosif G. Ghetie
R5,741 Discovery Miles 57 410 Ships in 10 - 15 working days

This book provides a comprehensive methodology for analysis and evaluation of technical characteristics and features of distributed networks and systems management platforms. The analysis covers management platforms run-time, development, and implementation environments. Operability, scalability, interoperability, and aspects of applications portability are discussed. Topics include: open systems and distributed management platforms; analysis of management platform components such as graphical user interface, event management, communications, object manipulation, database management, hardware, operating systems, distributed directory, security and time services; in-depth analysis of network and systems management applications; comprehensive evaluation of Bull ISM/OpenMaster, Cabletron Spectrum, Cambio Networks (COMMAND), Computer Associates CA-Unicenter, DEC TeMIP and PolyCenter NetView, HP OpenView, IBM NetView for AIX and TMN WorkBench for AIX Applications Development Environment, Microsoft SMS, Network Management Forum SPIRIT, Remedy Corporation ARS, Sun Solstice Enterprise Manager and SunNet Manager, and Tivoli TME management platforms and their applications; state-of-the-art in distributed management technology; network and systems management standards; practical information on evaluating and selecting management platformsA/LISTA. Networks and Systems Management: Platforms Analysis and Evaluation is a technical reference work on distributed management platforms for network operators, systems administrators, computer engineers, network designers, developers and planners. It can also be used as an advanced level textbook or reference work in courses on operation and management ofdata communications, telecommunications and distributed computing systems.

Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Hardcover,... Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Hardcover, 1st ed. 2021)
Victoria L. Lemieux, Chen Feng
bundle available
R3,508 Discovery Miles 35 080 Ships in 10 - 15 working days

This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different "layers" in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems. Blockchain technology has emerged as a solution to the problem of trust in data and records, as well as trust in social, political and economic institutions, due to its profound potential as a digital trust infrastructure. Blockchain is a DLT in which confirmed and validated sets of transactions are stored in blocks that are chained together to make tampering more difficult and render records immutable. This book is dedicated to exploring and disseminating the latest findings on the relationships between socio-political and economic data, record-keeping, and technical aspects of blockchain.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Koning Eenoog - 'n Migranteverhaal
Toef Jaeger Paperback R101 Discovery Miles 1 010
History of the Counties of Ayr and…
James Paterson Paperback R632 Discovery Miles 6 320
Ward 3, Precinct 1; City of Boston: List…
Boston Listing Board Paperback R688 Discovery Miles 6 880
Bourgs, Talbots, Youngs, Rappolds…
James A Bourg Jr Hardcover R784 R668 Discovery Miles 6 680
The Clan Donald; Volume 2
Angus MacDonald, Archibald MacDonald Hardcover R1,313 Discovery Miles 13 130
Genealogy of the Ancestry and Posterity…
Frederick Salmon Pease Paperback R470 Discovery Miles 4 700
The Small Regiment - Volume 1 Origins of…
Gerald A McKinnon Hardcover R1,367 Discovery Miles 13 670
Annual Register of the United States…
United States Naval Academy Paperback R374 Discovery Miles 3 740
A General and Heraldic Dictionary of the…
John Burke Hardcover R1,211 Discovery Miles 12 110
Taming the Tiger - The Story of the…
Richard G.M.L. Stiles Hardcover R1,613 Discovery Miles 16 130

 

Partners