0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (335)
  • R250 - R500 (873)
  • R500+ (14,062)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Formal Description Techniques VIII (Hardcover, 1996 ed.): Gregor von Bochmann, Rachida Dssouli, Omar Rafiq Formal Description Techniques VIII (Hardcover, 1996 ed.)
Gregor von Bochmann, Rachida Dssouli, Omar Rafiq
R5,852 Discovery Miles 58 520 Ships in 10 - 15 working days

This volume contains the latest worldwide research results on formal description techniques applicable to telecommunications, covering their theoretical foundations, industrial applications and practical usage. The book presents the selected proceedings of the eighth International Conference on Formal Description Techniques, arranged by the International Federation for Information Processing and held in Montreal, Canada, October 1995.

(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Third Edition (Paperback, 3rd Edition): M. Chapple (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Third Edition (Paperback, 3rd Edition)
M. Chapple
R802 Discovery Miles 8 020 Ships in 12 - 17 working days

The only official CCSP practice test product endorsed by (ISC)2 With over 850 practice questions all new for the 2022-2025 exam objectives, (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 3rd Edition gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you've already mastered. As the only official practice test product for the CCSP exam endorsed by (ISC)2, this essential resource is your best bet for gaining a thorough understanding of the topic. It also illustrates the relative importance of each domain, helping you plan your remaining study time so you can go into the exam fully confident in your knowledge. When you're ready, two practice exams allow you to simulate the exam day experience and apply your own test-taking strategies with domains given in proportion to the real thing. The online learning environment and practice exams are the perfect way to prepare and make your progress easy to track. For this new Third Edition, cloud security experts Mike Chapple and David Seidl have delivered an all-new question set for the new CCSP 2022-2025 objectives. These authors are well known for their best-selling (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests and now they've joined forces again to deliver the same high caliber practice questions for the CCSP exam.

Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.): Chung In-Hang, Lirong Cui, F.K. Hwang Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.)
Chung In-Hang, Lirong Cui, F.K. Hwang
R2,999 Discovery Miles 29 990 Ships in 10 - 15 working days

The consecutive-k system was first studied around 1980, and it soon became a very popular subject. The reasons were many-folded, includ ing: 1. The system is simple and natural. So most people can understand it and many can do some analysis. Yet it can grow in many directions and there is no lack of new topics. 2. The system is simple enough to become a prototype for demonstrat ing various ideas related to reliability. For example, the interesting concept of component importance works best with the consecutive-k system. 3. The system is supported by many applications. Twenty years have gone and hundreds of papers have been published on the subject. This seems to be a good time for retrospect and to sort the scattered material into a book. Besides providing our own per spective, the book will also serve as an easy reference to the numerous ramifications of the subject. It is hoped that a summary of work in the current period will become the seed of future break-through."

Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.): Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.)
Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler
R4,494 Discovery Miles 44 940 Ships in 12 - 17 working days

Grid Middleware and Services: Challenges and Solutions is the eighth volume of the CoreGRID series. The CoreGrid Proceedings is the premiere European event on Grid Computing. This book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main focus in this volume is on Grid middleware and service level agreement. Grid middleware and Grid services are two pillars of grid computing systems and applications. This book includes high-level contributions by leading researchers in both areas and presents current solutions together with future challenges. This volume includes sections on knowledge and data management on grids, Grid resource management and scheduling, Grid information, resource and workflow monitoring services, and service level agreements. Grid Middleware and Services: Challenges and Solutions is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Future Communication Technology and Engineering - Proceedings of the 2014 International Conference on Future Communication... Future Communication Technology and Engineering - Proceedings of the 2014 International Conference on Future Communication Technology and Engineering (FCTE 2014), Shenzhen, China, 16-17 November 2014 (Hardcover)
Kennis Chan
R4,033 Discovery Miles 40 330 Ships in 12 - 17 working days

Future Communication Technology and Engineering is a collection of papers presented at the 2014 International Conference on Future Communication Technology and Engineering (Shenzhen, China 16-17 November 2014). Covering a wide range of topics (communication systems, automation and control engineering, electrical engineering), the book includes the state-of-art in research on communication technology, and will be of interest to academics and professionals in the above mentioned fields.

Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014): Gi-Chul... Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014)
Gi-Chul Yang, Sio-Iong Ao, L. Engelman
R5,729 Discovery Miles 57 290 Ships in 10 - 15 working days

This book contains revised and extended research articles written by prominent researchers participating in the international conference on Advances in Engineering Technologies and Physical Science ("London, U.K., 3-5 July, 2013)." Topics covered include mechanical engineering, bioengineering, internet engineering, image engineering, wireless networks, knowledge engineering, manufacturing engineering, and industrial applications. The book offers state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science.

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.): Jean-Marc Adamo Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.)
Jean-Marc Adamo
R4,439 Discovery Miles 44 390 Ships in 12 - 17 working days

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library presents ARCH, a library built as an extension to MPI. ARCH relies on a small set of programming abstractions that allow the writing of well-structured multi-threaded parallel codes according to the object-oriented programming style. ARCH has been written with C++. The book describes the built-in classes, and illustrates their use through several template application cases in several fields of interest: Distributed Algorithms (global completion detection, distributed process serialization), Parallel Combinatorial Optimization (A* procedure), Parallel Image-Processing (segmentation by region growing). It shows how new application-level distributed data types - such as a distributed tree and a distributed graph - can be derived from the built-in classes. A feature of interest to readers is that both the library and the application codes used for illustration purposes are available via the Internet. The material can be downloaded for installation and personal parallel code development on the reader's computer system. ARCH can be run on Unix/Linux as well as Windows NT-based platforms. Current installations include the IBM-SP2, the CRAY-T3E, the Intel Paragon, PC-networks under Linux or Windows NT. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is aimed at scientists who need to implement parallel/distributed algorithms requiring complicated local and/or distributed control structures. It can also benefit parallel/distributed program developers who wish to write codes in the object-oriented style. The author has been using ARCH for several years as a medium to teach parallel and network programming. Teachers can employ the library for the same purpose while students can use it for training. Although ARCH has been used so far in an academic environment, it will be an effective tool for professionals as well. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is suitable as a secondary text for a graduate level course on Data Communications and Networks, Programming Languages, Algorithms and Computational Theory and Distributed Computing and as a reference for researchers and practitioners in industry.

Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995... Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995 (Hardcover, 1995 ed.)
A.S. Sethi, Y. Raynaud, F. Faure-Vincent
R8,514 Discovery Miles 85 140 Ships in 12 - 17 working days

Integrated network management plays a pivotal role in establishing and maintaining an efficient worldwide information infrastructure. This volume presents a state-of-the-art review of the latest worldwide research results covering this topic. The book contains the selected proceedings of the fourth International Symposium on Integrated Network Management, arranged by the International Federation for Information Processing and jointly sponsored by the IEEE. The Symposium was held in Santa Barbara, California, May 1995.

Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover): Dimitris N Chorafas Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover)
Dimitris N Chorafas
R2,901 Discovery Miles 29 010 Ships in 10 - 15 working days

This book addresses the changing role of networks and the evolving structure of an Infrastructure Superhighway. The requirements for leadership in telecommunications are reviewed from different viewpoints: Network operators, equipment manufacturers, software developers and user organizations. Emphasis is placed on multimedia and what multimedia solutions would mean to telephone utilities and endusers. Based on extensive research undertaken in Europe, US and Japan, Dimitris Chorafas identifies new domains of applications, presents the breakthroughs which have currently been achieved and outlines the systems solutions necessary to fruitfully exploit new technology.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.): Xiaoyu Yang, Lizhe Wang, Wei Jie Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.)
Xiaoyu Yang, Lizhe Wang, Wei Jie
R4,458 Discovery Miles 44 580 Ships in 10 - 15 working days

This guidebook on e-science presents real-world examples of practices and applications, demonstrating how a range of computational technologies and tools can be employed to build essential infrastructures supporting next-generation scientific research. Each chapter provides introductory material on core concepts and principles, as well as descriptions and discussions of relevant e-science methodologies, architectures, tools, systems, services and frameworks. Features: includes contributions from an international selection of preeminent e-science experts and practitioners; discusses use of mainstream grid computing and peer-to-peer grid technology for "open" research and resource sharing in scientific research; presents varied methods for data management in data-intensive research; investigates issues of e-infrastructure interoperability, security, trust and privacy for collaborative research; examines workflow technology for the automation of scientific processes; describes applications of e-science.

Networks in the Russian Market Economy (Hardcover): M. Lonkila Networks in the Russian Market Economy (Hardcover)
M. Lonkila
R768 Discovery Miles 7 680 Ships in 12 - 17 working days

A PDF version of this book is available for free in open access via the OAPEN Library platform, www.oapen.org.
This book examinesthe significance of networks among the firms operative in the contemporary Russian software industry in the St. Petersburg region.It focuses on the kind of resources that are transmitted through the personalnetworks of Russian business managers and directors.

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019): Zhong-Hua... Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019)
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
R2,888 Discovery Miles 28 880 Ships in 10 - 15 working days

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Pricing Communication Networks - Economics, Technology & Modelling (Hardcover): C. Courcoubetis Pricing Communication Networks - Economics, Technology & Modelling (Hardcover)
C. Courcoubetis
R5,205 R4,320 Discovery Miles 43 200 Save R885 (17%) Ships in 12 - 17 working days

Recent advances in technology, combined with the deregulation of the telecommunication market and the proliferation of the Internet, have created a highly competitive environment for communication service providers. There is no simple recipe for pricing network service contracts in all contexts. Pricing is a complex subject, which depends on parameters of the actual market - including the degree of competition and customer demand - and parameters of technology, such as resource consumption, network architecture, resource availability, and cost.

Pricing Communication Networks: Economics, Technology and Modelling covers many important issues in providing new services, the relation between pricing and resource allocation in networks, and the emergence of the Internet and its pricing. It provides a framework of mathematical models for pricing multidimensional contracts with quality of service guarantees, and includes a useful background on network services and contracts, network technology, basic economics, and pricing strategy.

  • Provides a broad overview of network services and contracts.

  • Includes a primer on modern network technology and the economic concepts relevant to pricing and competition.

  • Discusses mathematical models for multiplexing bursty traffic flows, and applies these to measuring network capability and deriving pricing strategies for services with statistical quality guarantees.

  • Discusses definitions of cost for communication networks and explains the intricacies of cost-based pricing.

  • Explains congestion pricing and its potential applications in the Internet.

  • Illustrated throughout by detailed examples and figures.

  • Includes coverage of specialist topics, such as regulation, multicasting, interconnection, and auctions.
Pricing Communication Networks: Economics, Technology and Modelling is an essential reference for graduate students, researchers and practitioners from electrical engineering, computer science, economics and operations research. It can be used by economists to fill in the gaps in their knowledge of network services and technology and by engineers and operational researchers to gain the background in the economics that is required to understand how to price communication networks effectively.
Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,900 Discovery Miles 49 000 Ships in 12 - 17 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

Cloud Computing - Challenges, Limitations and R&D Solutions (Hardcover, 2014 ed.): Zaigham Mahmood Cloud Computing - Challenges, Limitations and R&D Solutions (Hardcover, 2014 ed.)
Zaigham Mahmood
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. Topics and features: presents a focus on the most important issues and limitations of cloud computing, covering cloud security and architecture, QoS and SLAs; discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud; introduces a simulation tool for energy-aware cloud environments, and an efficient congestion control system for data center networks; examines the issues of energy-aware VM consolidation in the IaaS provision, and software-defined networking for cloud related applications; reviews current trends and suggests future developments in virtualization, cloud security, QoS data warehouses, cloud federation approaches, and DBaaS provision; predicts how the next generation of utility computing infrastructures will be designed.

High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.): Ahmed N. Tantawy High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.)
Ahmed N. Tantawy
R4,448 Discovery Miles 44 480 Ships in 12 - 17 working days

'The world of information processing is going through a major phase of its evolution. Networking has been associated with computers since the 1960's. Communicating machines, exchanging information or cooperating to solve complex problems, were the dream of many scientists and engineers. Rudi mentary networks and protocols were invented. Local area networks capable of carrying a few megabits per second became basic components of corporate computing installations in the 1980's. At the same time, advances in optical transmission and switching technologies made it possible to transfer billions of bits per second. 'The availability of this huge bandwidth is making people wonder about the seemingly unlimited possibilities of these "fat information pipes" A new world where all interesting up-to-date information becomes instantaneously available to everyone everywhere is often portrayed to be around the comer. New applications are envisioned and their requirements are defined. 'The new field of High Performance Networking is burgeoning with activities at various levels. Several frontiers are being explored simultaneously. In order to achieve more bandwidth and better performance, work is progressing in optical transmission, high speed switching and network resource manage ment. Some researchers have started to investigate all-optical networking as a promising approach to remove the relatively slow electronics from the network infrastructure. This will also introduce a new environment with unique characteristics that will have a definite impact on network architec tures, topologies, addressing schemes, and protocols."

Managing Business and Service Networks (Hardcover, 2001 ed.): Lundy Lewis Managing Business and Service Networks (Hardcover, 2001 ed.)
Lundy Lewis
R4,494 Discovery Miles 44 940 Ships in 12 - 17 working days

Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds, our bodies, our love lives, our businesses, our forests, our countries, etc. Sometimes we don't call it "management" per se. We seldom talk about managing our minds or automobiles. But if we think of management in terms of monitoring, maintaining, and cultivating with respect to some goal, then it makes sense. We certainly monitor an automobile, albeit unconsciously, to make sure that it doesn't exhibit signs of trouble. And we certainly try to cultivate our minds. This book is about managing networks. That itself is not a new concept. We've been managing the networks that support our telephones for about 100 years, and we've been managing the networks that support our computers for about 20 years. What is new (and what motivated me to write this book) is the following: (i) the enormous advancements in networking technology as we transition th st from the 20 century to the 21 century, (ii) the increasing dependence of human activities on networking technology, and (iii) the commercialization of services that depend on networking technology (e.g., email and electronic commerce).

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,443 Discovery Miles 44 430 Ships in 12 - 17 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.):... Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.)
Vasily Popovich, Christophe Claramunt, Manfred Schrenk, Kyrill Korolenko
R4,607 R3,512 Discovery Miles 35 120 Save R1,095 (24%) Ships in 12 - 17 working days

The Workshop Proceedings reflect problems of advanced geo-information science with a special emphasis on environmental and urban challenges. The Proceedings incorporate papers presented by leading scientists doing research on environmental issues from modeling to analysis, information processing and visualization. As well as practitioners engaged in GIS and GIS applications development. The Proceedings pay close attention to the problems of scientific and technological innovations as well application opportunities such as getting environmental and global warming problems under control, as well as the monitoring, planning and simulation of urban systems with respect to economic trends as related to: Artificial intelligence; GIS ontologies; GIS data integration and modeling; Environmental management ; Urban GIS; Transportation GIS; GIS data fusion; GIS and corporate information systems; GIS and real-time monitoring systems; GIS algorithms and computational issues; Landscape studies; Global warming; GIS and the Arctic sea; Novel and emerging GIS research areas; Maritime and environmental GIS; and Coastal GIS.

Business Data Networks and Security, Global Edition (Paperback, 10th edition): Raymond Panko, Julia Panko Business Data Networks and Security, Global Edition (Paperback, 10th edition)
Raymond Panko, Julia Panko
R2,567 Discovery Miles 25 670 Ships in 12 - 17 working days

For undergraduate and graduate courses in Business Data Communication / Networking (MIS) Clear writing style, job-ready detail, and focus on the technologies used in today's marketplace Business Data Networks and Security guides readers through the details of networking, while helping them train for the workplace. It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation, switch purchasing considerations, and more; and covers the latest in networking techniques, wireless networking, with an emphasis on security. With this text as a guide, readers learn the basic, introductory topics as a firm foundation; get sound training for the marketplace; see the latest advances in wireless networking; and learn the importance and ins and outs of security.

A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover): Mitch Seymour A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover)
Mitch Seymour; Illustrated by Mitch Seymour, Elyse Seymour
R625 Discovery Miles 6 250 Ships in 10 - 15 working days
Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017): Igor Linkov,... Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017)
Igor Linkov, Jose Manuel Palma-Oliveira
R6,432 Discovery Miles 64 320 Ships in 10 - 15 working days

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.): Andre Girard, Brunilde... Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.)
Andre Girard, Brunilde Sanso, Felida Vazquez-Abad
R3,095 Discovery Miles 30 950 Ships in 10 - 15 working days

With the ever increasing growth of services and the corresponding demand for Quality of Service requirements that are placed on IP-based networks, the essential aspects of network planning will be critical in the coming years. A wide number of problems must be faced in order for the next generation of IP networks to meet their expected performance. With Performance Evaluation and Planning Methods for the Next Generation Internet, the editors have prepared a volume that outlines and illustrates these developing trends.

A number of the problems examined and analyzed in the book are:

-The design of IP networks and guaranteed performance

-Performances of virtual private networks

-Network design and reliability

-The issues of pricing, routing and the management of QoS

-Design problems arising from wireless networks

-Controlling network congestion

-New applications spawned from Internet use

-Several new models are introduced that will lead to better Internet performance

These are a few of the problem areas addressed in the book and only a selective example of some of the coming key areas in networks requiring performance evaluation and network planning.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Black Sea Flood Question: Changes in…
Valentina Yanko-hombach, Allan S. Gilbert, … Hardcover R7,286 Discovery Miles 72 860
Photogrammetric Applications for…
Jon Bedford Paperback R1,319 Discovery Miles 13 190
Teddy Animals Fun Foam Kit
R162 Discovery Miles 1 620
Adobe Photoshop Elements Advanced…
Ted Padova Paperback R1,128 R862 Discovery Miles 8 620
University Games Paddington Bear Colour…
 (1)
R340 R306 Discovery Miles 3 060
Processes in GeoMedia-Volume I
Chaplina Tatiana Olegovna Hardcover R3,405 Discovery Miles 34 050
Photoshop CS2 RAW
Mikkel Aaland Paperback R822 R629 Discovery Miles 6 290
The Physical Geography of the Sea
Matthew Fontaine Maury Paperback R582 Discovery Miles 5 820
Responsive Web Design with Adobe…
Dan Rose Paperback R963 R188 Discovery Miles 1 880
Coastal Environment, Disaster, and…
X. San Liang, Yuanzhi Zhang Hardcover R3,376 Discovery Miles 33 760

 

Partners