0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,585)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CCNP Routing and Switching Portable Command Guide (Paperback, 2nd Revised ed.): Scott Empson, Patrick Gargano, Hans Roth CCNP Routing and Switching Portable Command Guide (Paperback, 2nd Revised ed.)
Scott Empson, Patrick Gargano, Hans Roth
R810 Discovery Miles 8 100 Ships in 10 - 15 working days

CCNP Routing and Switching Portable Command Guide All ROUTE (300-101) and SWITCH (300-115) Commands in One Compact, Portable Resource Preparing for the CCNP (R) ROUTE or CCNP SWITCH exam? Working as a network professional? Here are all the CCNP-level commands you'll need, in one handy resource. The CCNP Routing and Switching Portable Command Guide is filled with valuable, easy-to-access information, and it's portable enough to use whether you're in the server room or the equipment closet. This guide helps you memorize commands and concepts as you prepare to pass the CCNP ROUTE (300-101) or CCNP SWITCH (300-115) exams. It summarizes all CCNP certification-level Cisco IOS (R) Software commands, keywords, command arguments, and associated prompts, offering tips and examples for applying them in real-world environments. Throughout, configuration examples deepen your understanding of how these commands are used in actual network designs. Whenever you're researching routing or switching solutions, you won't find a quicker, more useful offline resource. --Logical "how-to" topic groupings inside the front and back covers provide one-stop research --Compact size makes it easy to carry with you, wherever you go --Helps you review important commands before taking the CCNP ROUTE or CCNP SWITCH certification exam --"Create Your Own Journal" appendix with blank, lined pages enables you to personalize the book for your own needs --"What Do You Want to Do?" chart inside front and back covers helps you to quickly reference specific tasks

Cyber Situational Awareness - Issues and Research (Hardcover, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Hardcover, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Filtering and Control of Wireless Networked Systems (Hardcover, 1st ed. 2017): Dan Zhang, Qing-Guo Wang, Li Yu Filtering and Control of Wireless Networked Systems (Hardcover, 1st ed. 2017)
Dan Zhang, Qing-Guo Wang, Li Yu
R3,602 R3,341 Discovery Miles 33 410 Save R261 (7%) Ships in 10 - 15 working days

This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3-6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7-10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11-14) focuses on the distributed control of wireless networked systems. In view of the rapid deployment and development of wireless networked systems for communication and control applications, the book represents a timely contribution and provides valuable insights, useful methods and effective algorithms for the analysis and design of wireless networked control systems. It is a valuable resource for researchers in the control and communication communities

Formal Description Techniques and Protocol Specification, Testing and Verification - FORTE X / PSTV XVII '97 (Hardcover,... Formal Description Techniques and Protocol Specification, Testing and Verification - FORTE X / PSTV XVII '97 (Hardcover, 1997 ed.)
Atsushi Togashi, Tadanori Mizuno, Norio Shiratori, Teruo Higashino
R5,454 Discovery Miles 54 540 Ships in 18 - 22 working days

FORTE/PSTV '97 addresses Formal Description Techniques (FDTs) applicable to Distributed Systems and Communication Protocols (such as Estelle, LOTOS, SDL, ASN.1, TTCN, Z, Automata, Process Algebra, Logic). The conference is a forum for presentation of the state-of-the-art in theory, application, tools and industrialization of FDTs, and provides an excellent orientation for newcomers.

Higher-Order Components for Grid Programming - Making Grids More Usable (Hardcover, 2009 ed.): Jan Dunnweber, Sergei Gorlatch Higher-Order Components for Grid Programming - Making Grids More Usable (Hardcover, 2009 ed.)
Jan Dunnweber, Sergei Gorlatch
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

A major challenge in grid computing remains the application software development for this new kind of infrastructure. Grid application programmers have to take into account several complicated aspects: distribution of data and computations, parallel computations on different sites and processors, heterogeneity of the involved computers, load balancing, etc. Grid programmers thus demand novel programming methodologies that abstract over such technical details while preserving the beneficial features of modern grid middleware. For this purpose, the authors introduce Higher-Order Components (HOCs). HOCs implement generic parallel/distributed processing patterns, together with the required middleware support, and they are offered to users via a high-level service interface. Users only have to provide the application-specific pieces of their programs as parameters, while low-level implementation details, such as the transfer of data across the grid, are handled by the HOCs. HOCs were developed within the CoreGRID European Network of Excellence and have become an optional extension of the popular Globus middleware. The book provides the reader with hands-on experience, describing a broad collection of example applications from various fields of science and engineering, including biology, physics, etc. The Java code for these examples is provided online, complementing the book. The expected application performance is studied and reported for extensive performance experiments on different testbeds, including grids with worldwide distribution. The book is targeted at graduate students, advanced professionals, and researchers in both academia and industry. Readers can raise their level of knowledge about methodologies for programming contemporary parallel and distributed systems, and, furthermore, they can gain practical experience in using distributed software. Practical examples show how the complementary online material can easily be adopted in various new projects.

Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.): Messaoud Benantar Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.)
Messaoud Benantar
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

Access control is a method of allowing and disallowing certain operations on a computer or network system. This book details access control mechanisms that are emerging with the latest Internet programming technologies. It provides a thorough introduction to the foundations of programming systems security as well as the theory behind access control models. The author explores all models employed and describes how they work.

Logic Synthesis for Asynchronous Controllers and Interfaces (Hardcover, 2002 ed.): J. Cortadella, M. Kishinevsky, A.... Logic Synthesis for Asynchronous Controllers and Interfaces (Hardcover, 2002 ed.)
J. Cortadella, M. Kishinevsky, A. Kondratyev, Luciano Lavagno, Alex Yakovlev
R4,389 Discovery Miles 43 890 Ships in 18 - 22 working days

This book is devoted to logic synthesis and design techniques for asynchronous circuits. It uses the mathematical theory of Petri Nets and asynchronous automata to develop practical algorithms implemented in a public domain CAD tool. Asynchronous circuits have so far been designed mostly by hand, and are thus much less common than their synchronous counterparts, which have enjoyed a high level of design automation since the mid-1970s. Asynchronous circuits, on the other hand, can be very useful to tackle clock distribution, modularity, power dissipation and electro-magnetic interference in digital integrated circuits. This book provides the foundation needed for CAD-assisted design of such circuits, and can also be used as the basis for a graduate course on logic design.

Fuzziness in Petri Nets (Hardcover, 1999 ed.): Janette Cardoso, Heloisa Camargo Fuzziness in Petri Nets (Hardcover, 1999 ed.)
Janette Cardoso, Heloisa Camargo
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

The volume provides a comprehensive, up-to-date account on recent developments concerning the incorporation of fuzzy capabilities in Petri Net models. The results of such studies originated the class of models that have been designated by Fuzzy Petri Nets. The recent papers specially elaborated for this volume range over several aspects of fuzziness in Petri nets. They form an interesting collection of original works that covers a great variety of relevant problems concerning the concept of Fuzzy Petri Net model. The articles approach several of the most outstanding issues in the framework of Fuzzy Petri nets, such as the representation of time, consistency checking, learning, design, computational efficiency, modelling flexibility, among others. From the material collected in the book one can extract the points of view of leading researchers concerning the basic and advanced concepts, advantages, potential applications and open problems, related to the field.

Human and Automatic Speaker Recognition over Telecommunication Channels (Hardcover, 1st ed. 2016): Laura Fernandez Gallardo Human and Automatic Speaker Recognition over Telecommunication Channels (Hardcover, 1st ed. 2016)
Laura Fernandez Gallardo
R3,277 Discovery Miles 32 770 Ships in 10 - 15 working days

This work addresses the evaluation of the human and the automatic speaker recognition performances under different channel distortions caused by bandwidth limitation, codecs, and electro-acoustic user interfaces, among other impairments. Its main contribution is the demonstration of the benefits of communication channels of extended bandwidth, together with an insight into how speaker-specific characteristics of speech are preserved through different transmissions. It provides sufficient motivation for considering speaker recognition as a criterion for the migration from narrowband to enhanced bandwidths, such as wideband and super-wideband.

Global Perspectives on Cybersecurity Risk in Contemporary Business Systems (Hardcover): Festus Fatai Adedoyin, Bryan... Global Perspectives on Cybersecurity Risk in Contemporary Business Systems (Hardcover)
Festus Fatai Adedoyin, Bryan Christiansen
R7,280 Discovery Miles 72 800 Ships in 18 - 22 working days

The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Global Perspectives on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as artificial intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.

Broadband Wireless Access (Hardcover, 2002 ed.): Benny Bing Broadband Wireless Access (Hardcover, 2002 ed.)
Benny Bing
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.

Switching Networks: Recent Advances (Hardcover, 2001 ed.): Dingzhu Du, Hung Q. Ngo Switching Networks: Recent Advances (Hardcover, 2001 ed.)
Dingzhu Du, Hung Q. Ngo
R2,848 Discovery Miles 28 480 Ships in 18 - 22 working days

The switching net.work is an important. classic research area in t.ele- communication and comput.er net.works. It.s import.ancc st.ems from both theory and practice. In fact, some open problems, such as Benes conjec- ture on shuffle-exchange networks and Chung-Rmis conjecture on multi- rate rearrangeability, still attract many researchers and the further de- velopment in optical networks requires advanced technology in optical switching networks. In 1997, we had a workshop in switching networks held in NSF Sci- ence and Technology Center in Discrete Mathematics and Theoretical Computer Science (DIMACS), at Princeton University. This workshop was very successful. Many participants wished to have a similar activity every two or three years. This book is a result of such a wish. We are putting together SOllle important developments in this area during last. several years, including articles ill fault-tolerance, rearrang{~ability. non- blocking, optical networks. random permutation generat.ioll. and layout complexity. SOlllC of thos(~ art ides are research papers alld SOIllC an' sur- veys. All articles were reviewed. We would like to uWlItioll two special problems studied in those articles.

Integrated Network Management V - Integrated management in a virtual world Proceedings of the Fifth IFIP/IEEE International... Integrated Network Management V - Integrated management in a virtual world Proceedings of the Fifth IFIP/IEEE International Symposium on Integrated Network Management San Diego, California, U.S.A., May 12-16, 1997 (Hardcover, 1997 ed.)
Aurel Lazar, Robert Saracco
R8,080 Discovery Miles 80 800 Ships in 18 - 22 working days

Welcome to IM'97 We hope you had the opportunity to attend the Conference in beautiful San Diego. If that was the case, you will want to get back to these proceedings for further read ings and reflections. You'll find e-mail addresses of the main author of each paper, and you are surely encouraged to get in touch for further discussions. You can also take advantage of the CNOM (Committee on Network Operation and Management) web site where a virtual discus sion agora has been set up for IM'97 (URL: http: //www.cselt.stet.it/CNOMWWWIIM97.html). At this site you will find a brief summary of discussions that took place in the various panels, and slides that accompanied some of the presentations--all courtesy of the participants. If you have not been to the Conference, leafing through these proceedings may give you food for thought. Hopefully, you will also be joining the virtual world on the web for discussions with authors and others who were at the Conference. At IM'97 the two worlds of computer networks and telecommunications systems came to gether, each proposing a view to management that stems from their own paradigms. Each world made clear the need for end-to-end management and, therefore, each one stepped into the oth er's field. We feel that there is no winner but a mutual enrichment. The time is ripe for integra tion and it is likely that the next Conference will bear its fruit."

Mobility Management - Principle, Technology and Applications (Hardcover, 1st ed. 2016): Shanzhi Chen, Yan Shi, Bo Hu, Ming Ai Mobility Management - Principle, Technology and Applications (Hardcover, 1st ed. 2016)
Shanzhi Chen, Yan Shi, Bo Hu, Ming Ai
R4,520 R3,449 Discovery Miles 34 490 Save R1,071 (24%) Ships in 10 - 15 working days

This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences. The content is organized according to the reference models proposed by the authors, and emphasizes on technical principles rather than protocol details; a systematic and comprehensive introduction is presented yet without losing focuses; the existing technologies in cellular system, mobile Internet and IMS/SIP are also extensively compared. This book can be an indispensable reference for mobile communication engineers, computer network engineers, researchers and anyone else involved in academic, industrial and standardization activities on mobility management.

Communication Complexity and Parallel Computing (Hardcover, 1997 ed.): Juraj Hromkovic Communication Complexity and Parallel Computing (Hardcover, 1997 ed.)
Juraj Hromkovic
R1,595 Discovery Miles 15 950 Ships in 18 - 22 working days

The communication complexity of two-party protocols is an only 15 years old complexity measure, but it is already considered to be one of the fundamen tal complexity measures of recent complexity theory. Similarly to Kolmogorov complexity in the theory of sequential computations, communication complex ity is used as a method for the study of the complexity of concrete computing problems in parallel information processing. Especially, it is applied to prove lower bounds that say what computer resources (time, hardware, memory size) are necessary to compute the given task. Besides the estimation of the compu tational difficulty of computing problems the proved lower bounds are useful for proving the optimality of algorithms that are already designed. In some cases the knowledge about the communication complexity of a given problem may be even helpful in searching for efficient algorithms to this problem. The study of communication complexity becomes a well-defined indepen dent area of complexity theory. In addition to a strong relation to several funda mental complexity measures (and so to several fundamental problems of com plexity theory) communication complexity has contributed to the study and to the understanding of the nature of determinism, nondeterminism, and random ness in algorithmics. There already exists a non-trivial mathematical machinery to handle the communication complexity of concrete computing problems, which gives a hope that the approach based on communication complexity will be in strumental in the study of several central open problems of recent complexity theory."

Recent Advances in Systems Safety and Security (Hardcover, 1st ed. 2016): Emil Pricop, Grigore Stamatescu Recent Advances in Systems Safety and Security (Hardcover, 1st ed. 2016)
Emil Pricop, Grigore Stamatescu
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.

Advanced Topics in System and Signal Theory - A Mathematical Approach (Hardcover, 2010 ed.): Volker Pohl, Holger Boche Advanced Topics in System and Signal Theory - A Mathematical Approach (Hardcover, 2010 ed.)
Volker Pohl, Holger Boche
R2,782 Discovery Miles 27 820 Ships in 18 - 22 working days

The requirement of causality in system theory is inevitably accompanied by the appearance of certain mathematical operations, namely the Riesz proj- tion,theHilberttransform,andthespectralfactorizationmapping.Aclassical exampleillustratingthisisthedeterminationoftheso-calledWiener?lter(the linear, minimum means square error estimation ?lter for stationary stochastic sequences [88]). If the ?lter is not required to be causal, the transfer function of the Wiener ?lter is simply given by H(?)=? (?)/? (?),where ? (?) xy xx xx and ? (?) are certain given functions. However, if one requires that the - xy timation ?lter is causal, the transfer function of the optimal ?lter is given by 1 ? (?) xy H(?)= P ,?? (??,?] . + [? ] (?) [? ] (?) xx + xx? Here [? ] and [? ] represent the so called spectral factors of ? ,and xx + xx? xx P is the so called Riesz projection. Thus, compared to the non-causal ?lter, + two additional operations are necessary for the determination of the causal ?lter, namely the spectral factorization mapping ? ? ([? ] ,[? ] ),and xx xx + xx? the Riesz projection P .

Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN... Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 (Hardcover, 2008 ed.)
Ali Miri
R2,808 Discovery Miles 28 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 2008 IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada on July 14-15, 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Principles of Protocol Design (Hardcover, 2008 ed.): Robin Sharp Principles of Protocol Design (Hardcover, 2008 ed.)
Robin Sharp
R4,298 Discovery Miles 42 980 Ships in 18 - 22 working days

This book introduces the reader to the principles used in the construction of a large range of modern data communication protocols. The approach we take is rather a formal one, primarily based on descriptions of protocols in the notation of CSP. This not only enables us to describe protocols in a concise manner, but also to reason about many of their interesting properties and formally to prove certain aspects of their correctness with respect to appropriate speci?cations. Only after considering the main principles do we go on to consider actual protocols where these principles are exploited. This is a completely new edition of a book which was ?rst published in 1994, where the main focus of many international efforts to develop data communication systems was on OSI - Open Systems Interconnection - the standardised archit- ture for communication systems developed within the International Organisation for Standardization, ISO. In the intervening 13 years, many of the speci?c protocols - veloped as part of the OSI initiative have fallen into disuse. However, the terms and concepts introduced in the OSI Reference Model are still essential for a systematic and consistent analysis of data communication systems, and OSI terms are therefore used throughout. There are three signi?cant changes in this second edition of the book which p- ticularly re?ect recent developments in computer networks and distributed systems.

My personal Adaptive Global NET (MAGNET) (Hardcover, 2010 ed.): Ramjee Prasad My personal Adaptive Global NET (MAGNET) (Hardcover, 2010 ed.)
Ramjee Prasad
R4,262 Discovery Miles 42 620 Ships in 18 - 22 working days

Every endeavour is covered by some fault, just as ?re is covered by smoke. Therefore one should not give up the work born of his nature, even if such work is full of fault. - The Bhagvad-Gita (18.48) This book is the outcome of the research and developmentcontributions of partners from three different continents, Asia, Europe, America, coming from universities, research centers, industrial partners and SMEs (Small and Medium Enterprise), all of them collaborating in MAGNET (My Adaptive Personal Global Net) and MAGNET Beyond project supported by European Commission within the Sixth Framework Programme (FP6). The project was focusing on a secure user-centric approach developingsecure Personal Networks in multi-network, multi-device, and multi-user environments. The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, ?nds in this book the ?rst con?rmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the ?rst work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book re?ects how then project itself has been structured

ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012,... ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings (Hardcover, 2012 ed.)
Magda David Hercheui, Diane Whitehouse, William McIver Jr, Jackie Phahlamohlaka
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.

Comparative E-Government (Hardcover, 2010 ed.): Christopher G. Reddick Comparative E-Government (Hardcover, 2010 ed.)
Christopher G. Reddick
R5,521 Discovery Miles 55 210 Ships in 18 - 22 working days

Comparative E-Government examines the impact of information and communication technology (ICT) on governments throughout the world. It focuses on the adoption of e-government both by comparing different countries, and by focusing on individual countries and the success and challenges that they have faced. With 32 chapters from leading e-government scholars and practitioners from around the world, there is representation of developing and developed countries and their different stages of e-government adoption. Part I compares the adoption of e-government in two or more countries. The purpose of these chapters is to discern the development of e-government by comparing different counties and their individual experiences. Part II provides a more in-depth focus on case studies of e-government adoption in select countries. Part III, the last part of the book, examines emerging innovations and technologies in the adoption of e-government in different countries. Some of the emerging technologies are the new social media movement, the development of e-participation, interoperability, and geographic information systems (GIS).

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance... Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance (Hardcover, 2005 ed.)
Juraj Hromkovic, Ralf Klasing, A Pelc, Peter Ruzicka, Walter Unger
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

Preface Due to the development of hardware technologies (such as VLSI) in the early 1980s, the interest in parallel and distributive computing has been rapidly growingandinthelate1980sthestudyofparallelalgorithmsandarchitectures became one of the main topics in computer science. To bring the topic to educatorsandstudents, severalbooksonparallelcomputingwerewritten. The involvedtextbook IntroductiontoParallelAlgorithmsandArchitectures by F. Thomson Leighton in 1992 was one of the milestones in the development of parallel architectures and parallel algorithms. But in the last decade or so the main interest in parallel and distributive computing moved from the design of parallel algorithms and expensive parallel computers to the new distributive reality the world of interconnected computers that cooperate (often asynchronously) in order to solve di?erent tasks. Communication became one of the most frequently used terms of computer science because of the following reasons: (i) Considering the high performance of current computers, the communi- tion is often moretime consuming than the computing time of processors. As a result, the capacity of communication channels is the bottleneck in the execution of many distributive algorithms. (ii) Many tasks in the Internet are pure communication tasks. We do not want to compute anything, we only want to execute some information - change or to extract some information as soon as possible and as cheaply as possible. Also, we do not have a central database involving all basic knowledge. Instead, wehavea distributed memorywherethe basickno- edgeisdistributedamongthelocalmemoriesofalargenumberofdi?erent computers. The growing importance of solving pure communication tasks in the - terconnected world is the main motivation for writing this book."

Cryptography and Network Security (Hardcover): Marcelo Sampaio De Alencar Cryptography and Network Security (Hardcover)
Marcelo Sampaio De Alencar
R3,456 Discovery Miles 34 560 Ships in 9 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Space Exploration for Kids - A Junior…
Bruce Betts Hardcover R392 Discovery Miles 3 920
Religion, Nationalism and Foreign Policy…
Filiz Coban Oran Hardcover R3,176 Discovery Miles 31 760
Afspraak Met Moord - In Die Kake Van Die…
Jana Marx Paperback R330 R309 Discovery Miles 3 090
Mathematical Discourse - Language…
Kay O'Halloran Hardcover R6,407 Discovery Miles 64 070
Tragedy in the North Woods - The Murders…
Trudy Irene Scee Paperback R482 R445 Discovery Miles 4 450
Handbook of Research on Innovative…
Li Yan Hardcover R8,236 Discovery Miles 82 360
Sequence Data Mining
Guozhu Dong, Jian Pei Hardcover R2,737 Discovery Miles 27 370
Model Management and Analytics for Large…
Bedir Tekinerdogan, Onder Babur, … Paperback R3,159 R2,960 Discovery Miles 29 600
Temporal and Spatio-temporal Data Mining
Wynne Hsu, Mong Li Lee, … Hardcover R2,601 Discovery Miles 26 010
Jakkals en Wolf 1 - 6 Lekkerlag Stories…
Wendy Maartens Paperback R230 R216 Discovery Miles 2 160

 

Partners