0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (351)
  • R250 - R500 (929)
  • R500+ (15,811)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Distributed Event-Based Systems (Hardcover, 2006 ed.): Gero Muhl, Ludger Fiege, Peter Pietzuch Distributed Event-Based Systems (Hardcover, 2006 ed.)
Gero Muhl, Ludger Fiege, Peter Pietzuch
R2,496 R1,663 Discovery Miles 16 630 Save R833 (33%) Ships in 12 - 17 working days

In today s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time.

Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific other components in a traditional request/reply mode, but separate communication from computation through asynchronous communication mechanisms via a dedicated notification service.

Muhl, Fiege, and Pietzuch provide the reader with an in-depth description of event-based systems. They cover the complete spectrum of topics, ranging from a treatment of local event matching and distributed event forwarding algorithms, through a more practical discussion of software engineering issues raised by the event-based style, to a presentation of state-of-the-art research topics in event-based systems, such as composite event detection and security. Their presentation gives researchers a comprehensive overview of the area and lots of hints for future research. In addition, they show the power of event-based architectures in modern system design, thus encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.

Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R5,255 Discovery Miles 52 550 Ships in 10 - 15 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Business Data Networks and Security, Global Edition (Paperback, 10th edition): Raymond Panko, Julia Panko Business Data Networks and Security, Global Edition (Paperback, 10th edition)
Raymond Panko, Julia Panko
R2,423 Discovery Miles 24 230 Ships in 12 - 17 working days

For undergraduate and graduate courses in Business Data Communication / Networking (MIS) Clear writing style, job-ready detail, and focus on the technologies used in today's marketplace Business Data Networks and Security guides readers through the details of networking, while helping them train for the workplace. It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation, switch purchasing considerations, and more; and covers the latest in networking techniques, wireless networking, with an emphasis on security. With this text as a guide, readers learn the basic, introductory topics as a firm foundation; get sound training for the marketplace; see the latest advances in wireless networking; and learn the importance and ins and outs of security.

ITIL(R) 4 Direct Plan and Improve (DPI) - Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI... ITIL(R) 4 Direct Plan and Improve (DPI) - Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification (Paperback)
Claire Agutter
R1,108 Discovery Miles 11 080 Ships in 10 - 15 working days

ITIL(R) 4 Direct, Plan and ImproveIf you've achieved your ITIL(R) 4 Foundation certificate, you're probably planning the next stage in your ITIL journey and which qualification to work towards. DPI provides essential knowledge and capabilities for service management professionals, supporting those involved in directing or planning based on strategy and continual improvement - a must-have skillset practitioners should seek beyond Foundation level. DPI is the only one of the ITIL 4 advanced level courses that leads to both Managing Professional (MP) and Strategic Leader (SL) status. The module is aimed at managers and aspiring managers at all levels, providing them with the practical skills needed to improve themselves and their organisation by way of effective strategic direction and delivering continual improvement. An excellent supplement to any training courseITIL(R) 4 Direct, Plan and Improve (DPI) - Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification is a study guide designed to help students pass the ITIL(R) 4 Direct, Plan and Improve module. The majority of this book is based on the AXELOS ITIL(R) 4: Direct, Plan and Improve publication and the associated DPI Strategist syllabus. It provides students with the information they need to pass the DPI exam, and help them become a successful practitioner. Suitable for existing ITIL v3 experts, ITIL 4 Managing Professional (MP) students, ITSM (IT service management) practitioners who are adopting ITIL 4, approved training organisations, IT service managers, IT managers and those in IT support roles, the book covers: Key concepts: Scope, key principles and methods; The role of governance, risk and compliance; Continual improvement; Organisational change management; Measurement and reporting; Value streams and practices; and Exam preparation. A useful tool throughout your careerIn addition to being an essential study aid, the author - a seasoned ITSM professional - also provides additional guidance throughout the book which you can lean on once your training and exam are over. The book includes her own practical experience from which she gives advice and points to think about along the way so that you can refer back to this book for years to come - long after you've passed your exam. The essential link between your ITIL qualification and the real world - buy this book today!ITIL(R) is a registered trade mark of AXELOS Limited. All rights reserved. This book is an official AXELOS licensed product.

Data Communications Principles (Hardcover, 1992 ed.): Richard D. Gitlin, Jeremiah F. Hayes, Stephen B Weinstein Data Communications Principles (Hardcover, 1992 ed.)
Richard D. Gitlin, Jeremiah F. Hayes, Stephen B Weinstein
R5,612 Discovery Miles 56 120 Ships in 10 - 15 working days

This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the book, exercises and applications illustrate the material while up-to-date references round out the work.

Geolocation Techniques - Principles and Applications (Hardcover, 2013): Camillo Gentile, Nayef Alsindi, Ronald Raulefs, Carole... Geolocation Techniques - Principles and Applications (Hardcover, 2013)
Camillo Gentile, Nayef Alsindi, Ronald Raulefs, Carole Teolis
R5,422 Discovery Miles 54 220 Ships in 12 - 17 working days

Basics of Distributed and Cooperative Radio and Non-Radio Based Geolocation provides a detailed overview of geolocation technologies. The book covers the basic principles of geolocation, including ranging techniques to localization technologies, fingerprinting and localization in wireless sensor networks. This book also examines the latest algorithms and techniques such as Kalman Filtering, Gauss-Newton Filtering and Particle Filtering.

Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New): Panos Constantinides Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New)
Panos Constantinides
R4,674 Discovery Miles 46 740 Ships in 10 - 15 working days

In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at addressing this need by offering a fresh new perspective on information infrastructure development. It achieves this by drawing on and adapting theory that was initially developed to study natural resource commons arrangements such as inshore fisheries, forests, irrigation systems, and pastures, while placing great emphasis on the complex problems and social dilemmas that often arise in the negotiations.

CISSP Passport (Paperback): Bobby Rogers CISSP Passport (Paperback)
Bobby Rogers
R598 Discovery Miles 5 980 Ships in 12 - 17 working days

This quick review study guide offers 100% coverage of every topic on the latest version of the CISSP exam This powerful exam preparation resource presents an accelerated review of all objectives for the 2021 release of the challenging Certified Information Systems Security Professional exam. Written in the proven Passport format, the book enables you to focus on specific topics, determine areas of need, and tailor an effective course for study. CISSP Passport enables you to tailor your studies and drill down into the exam's objectives. The book features special elements that highlight actual exam topics, define need-to-know terms, point out potential exam pitfalls, and list additional resources for further information. Each chapter includes a review section that provides bulleted summations by exam objective as well as practice exam questions with in-depth answer explanations. * Provides complete coverage of every objective on the CISSP exam * Online content includes 200 practice questions in the customizable TotalTester exam engine * Written by a seasoned cybersecurity expert

Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management... Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management of Multimedia Networks and Services (MMNS'2000) September 25-28, 2000, Fortaleza, Ceara, Brazil (Hardcover, 2000 ed.)
Jose Neuman De Souza, Raouf Boutaba
R5,606 Discovery Miles 56 060 Ships in 10 - 15 working days

Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil) The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management."

Mobile Information Systems II - IFIP Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7,... Mobile Information Systems II - IFIP Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7, 2005 (Hardcover, 2005 ed.)
John Krogstie, Karlheinz Kautz, David Allen
R2,824 Discovery Miles 28 240 Ships in 10 - 15 working days

Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.

SAP R/3 Implementation - Methods and Tools (Hardcover, 2000 ed.): Hans-Jurgen Appelrath, Joerg Ritter SAP R/3 Implementation - Methods and Tools (Hardcover, 2000 ed.)
Hans-Jurgen Appelrath, Joerg Ritter
R1,582 Discovery Miles 15 820 Ships in 10 - 15 working days

Before use, standard ERP systems such as SAP R/3 need to be customized to meet the concrete requirements of the individual enterprise. This book provides an overview of the process models, methods, and tools offered by SAP and its partners to support this complex and time-consuming process. It begins by characterizing the foundations of the latest ERP systems from both a conceptual and technical viewpoint, whereby the most important components and functions of SAP R/3 are described. The main part of the book then goes on to present the current methods and tools for the R/3 implementation based on newer process models (roadmaps).

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R2,874 Discovery Miles 28 740 Ships in 10 - 15 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014): Gi-Chul... Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014)
Gi-Chul Yang, Sio-Iong Ao, L. Engelman
R5,579 Discovery Miles 55 790 Ships in 10 - 15 working days

This book contains revised and extended research articles written by prominent researchers participating in the international conference on Advances in Engineering Technologies and Physical Science ("London, U.K., 3-5 July, 2013)." Topics covered include mechanical engineering, bioengineering, internet engineering, image engineering, wireless networks, knowledge engineering, manufacturing engineering, and industrial applications. The book offers state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science.

Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover): Franco F. Orsucci, Nicoletta... Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover)
Franco F. Orsucci, Nicoletta Sala
R4,871 Discovery Miles 48 710 Ships in 10 - 15 working days

Information and communication technologies are increasingly prolific worldwide, exposing the issues and challenges of the assimilation of existing living environments to the shift in technological communication infrastructure. ""Reflexing Interfaces"" discusses the application of complex theories in information and communication technology, with a focus on the interaction between living systems and information technologies. This innovative view provides researcher, scholars, and IT professionals with a fundamental resource on such compelling topics as virtual reality; fuzzy logic systems; and complexity science in artificial intelligence, evolutionary computation, neural networks, and 3-D modeling.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017): Igor Linkov,... Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017)
Igor Linkov, Jose Manuel Palma-Oliveira
R6,265 Discovery Miles 62 650 Ships in 10 - 15 working days

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Active Networks and Active Network Management - A Proactive Management Framework (Mixed media product, 2001 ed.): Stephen F.... Active Networks and Active Network Management - A Proactive Management Framework (Mixed media product, 2001 ed.)
Stephen F. Bush, Amit B. Kulkarni
R2,908 Discovery Miles 29 080 Ships in 10 - 15 working days

Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time.

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019): Zhong-Hua... Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019)
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
R2,803 Discovery Miles 28 030 Ships in 10 - 15 working days

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.): Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.)
Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler
R4,783 R4,463 Discovery Miles 44 630 Save R320 (7%) Ships in 12 - 17 working days

Grid Middleware and Services: Challenges and Solutions is the eighth volume of the CoreGRID series. The CoreGrid Proceedings is the premiere European event on Grid Computing. This book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main focus in this volume is on Grid middleware and service level agreement. Grid middleware and Grid services are two pillars of grid computing systems and applications. This book includes high-level contributions by leading researchers in both areas and presents current solutions together with future challenges. This volume includes sections on knowledge and data management on grids, Grid resource management and scheduling, Grid information, resource and workflow monitoring services, and service level agreements. Grid Middleware and Services: Challenges and Solutions is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Blockchain Security from the Bottom Up: Securing a nd Preventing Attacks on Cryptocurrencies, Decentr alized Applications,... Blockchain Security from the Bottom Up: Securing a nd Preventing Attacks on Cryptocurrencies, Decentr alized Applications, NFTs, and Smart Contracts (Paperback)
HE Poston
R668 R468 Discovery Miles 4 680 Save R200 (30%) Ships in 9 - 15 working days

The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution. You'll also find: Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work A can't-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations.

Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.): Chung In-Hang, Lirong Cui, F.K. Hwang Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.)
Chung In-Hang, Lirong Cui, F.K. Hwang
R2,914 Discovery Miles 29 140 Ships in 10 - 15 working days

The consecutive-k system was first studied around 1980, and it soon became a very popular subject. The reasons were many-folded, includ ing: 1. The system is simple and natural. So most people can understand it and many can do some analysis. Yet it can grow in many directions and there is no lack of new topics. 2. The system is simple enough to become a prototype for demonstrat ing various ideas related to reliability. For example, the interesting concept of component importance works best with the consecutive-k system. 3. The system is supported by many applications. Twenty years have gone and hundreds of papers have been published on the subject. This seems to be a good time for retrospect and to sort the scattered material into a book. Besides providing our own per spective, the book will also serve as an easy reference to the numerous ramifications of the subject. It is hoped that a summary of work in the current period will become the seed of future break-through."

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,829 Discovery Miles 18 290 Ships in 10 - 15 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Cloud Computing - Challenges, Limitations and R&D Solutions (Hardcover, 2014 ed.): Zaigham Mahmood Cloud Computing - Challenges, Limitations and R&D Solutions (Hardcover, 2014 ed.)
Zaigham Mahmood
R2,842 Discovery Miles 28 420 Ships in 10 - 15 working days

This book reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. Topics and features: presents a focus on the most important issues and limitations of cloud computing, covering cloud security and architecture, QoS and SLAs; discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud; introduces a simulation tool for energy-aware cloud environments, and an efficient congestion control system for data center networks; examines the issues of energy-aware VM consolidation in the IaaS provision, and software-defined networking for cloud related applications; reviews current trends and suggests future developments in virtualization, cloud security, QoS data warehouses, cloud federation approaches, and DBaaS provision; predicts how the next generation of utility computing infrastructures will be designed.

Formal Description Techniques VIII (Hardcover, 1996 ed.): Gregor von Bochmann, Rachida Dssouli, Omar Rafiq Formal Description Techniques VIII (Hardcover, 1996 ed.)
Gregor von Bochmann, Rachida Dssouli, Omar Rafiq
R5,702 Discovery Miles 57 020 Ships in 10 - 15 working days

This volume contains the latest worldwide research results on formal description techniques applicable to telecommunications, covering their theoretical foundations, industrial applications and practical usage. The book presents the selected proceedings of the eighth International Conference on Formal Description Techniques, arranged by the International Federation for Information Processing and held in Montreal, Canada, October 1995.

Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.): Xiaoyu Yang, Lizhe Wang, Wei Jie Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.)
Xiaoyu Yang, Lizhe Wang, Wei Jie
R4,337 Discovery Miles 43 370 Ships in 10 - 15 working days

This guidebook on e-science presents real-world examples of practices and applications, demonstrating how a range of computational technologies and tools can be employed to build essential infrastructures supporting next-generation scientific research. Each chapter provides introductory material on core concepts and principles, as well as descriptions and discussions of relevant e-science methodologies, architectures, tools, systems, services and frameworks. Features: includes contributions from an international selection of preeminent e-science experts and practitioners; discusses use of mainstream grid computing and peer-to-peer grid technology for "open" research and resource sharing in scientific research; presents varied methods for data management in data-intensive research; investigates issues of e-infrastructure interoperability, security, trust and privacy for collaborative research; examines workflow technology for the automation of scientific processes; describes applications of e-science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Twin Technology
Gopal Chaudhary, Manju Khari, … Paperback R1,381 Discovery Miles 13 810
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Service management and scheduling in…
Yongkui Liu, Lin Zhang Hardcover R4,199 Discovery Miles 41 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,670 Discovery Miles 56 700
Computer Networking: A Top-Down…
James Kurose, Keith Ross Paperback R2,341 R2,135 Discovery Miles 21 350
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R635 Discovery Miles 6 350
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,419 R1,156 Discovery Miles 11 560
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,249 Discovery Miles 12 490
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540

 

Partners