0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (256)
  • R250 - R500 (864)
  • R500+ (13,654)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition): Michael... Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition)
Michael Goodrich, Roberto Tamassia
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels.

Amazon CloudWatch Events User Guide (Hardcover): Documentation Team Amazon CloudWatch Events User Guide (Hardcover)
Documentation Team
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days
Emerging Topics and Technologies in Information Systems (Hardcover): Miltiadis D Lytras, Patricia Ordonez De Pablos Emerging Topics and Technologies in Information Systems (Hardcover)
Miltiadis D Lytras, Patricia Ordonez De Pablos
R4,940 Discovery Miles 49 400 Ships in 18 - 22 working days

Today, the information systems (IS) discipline faces new challenges. Emerging technologies as well as matured approaches for the social, technical, and developmental role of IS provide a new context for the evolution of the discipline over the next few years. ""Emerging Topics and Technologies in Information Systems"" communicates the challenges and opportunities that information systems research is dealing with today while promoting cutting-edge research on how current IS support is creating the critical backbone for the knowledge society. This book is an essential reference for policy makers, government officers, academicians, and practitioners thirsty for knowledge on IS and IT beyond traditional textbooks.

Social Software and Web 2.0 Technology Trend - Blogs, Podcasts and Wikis (Hardcover): P. Candace Deans Social Software and Web 2.0 Technology Trend - Blogs, Podcasts and Wikis (Hardcover)
P. Candace Deans
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

Very little has been written to address the emerging trends in social software and technology. With these technologies and applications being relatively new and evolving rapidly, research is wide open in these fields. Social Software and Web 2.0 Technology Trends fills this critical research need, providing an overview of the current state of Web 2.0 technologies and their impact on organizations and educational institutions. Written for academicians and practicing managers, this estimable book presents business applications as well as implementations for institutions of higher education with numerous examples of how these technologies are currently being used. Delivering authoritative insights to a rapidly evolving domain of technology application, this book is an invaluable resource for both academic libraries and for classroom instruction.

Systematic Design of Sigma-Delta Analog-to-Digital Converters (Hardcover, 2004 ed.): Ovidiu Bajdechi, Johan Huijsing Systematic Design of Sigma-Delta Analog-to-Digital Converters (Hardcover, 2004 ed.)
Ovidiu Bajdechi, Johan Huijsing
R4,119 Discovery Miles 41 190 Ships in 18 - 22 working days

Systematic Design of Sigma-Delta Analog-to-Digital Converters describes the issues related to the sigma-delta analog-to-digital converters (ADCs) design in a systematic manner: from the top level of abstraction represented by the filters defining signal and noise transfer functions (STF, NTF), passing through the architecture level where topology-related performance is calculated and simulated, and finally down to parameters of circuit elements like resistors, capacitors, and amplifier transconductances used in individual integrators. The systematic approach allows the evaluation of different loop filters (order, aggressiveness, discrete-time or continuous-time implementation) with quantizers varying in resolution. Topologies explored range from simple single loops to multiple cascaded loops with complex structures including more feedbacks and feedforwards. For differential circuits, with switched-capacitor integrators for discrete-time (DT) loop filters and active-RC for continuous-time (CT) ones, the passive integrator components are calculated and the power consumption is estimated, based on top-level requirements like harmonic distortion and noise budget.
This unified, systematic approach to choosing the best sigma-delta ADC implementation for a given design target yields an interesting solution for a high-resolution, broadband (DSL-like) ADC operated at low oversampling ratio, which is detailed down to transistor-level schematics.
The target audience of Systematic Design of Sigma-Delta Analog-to-Digital Converters are engineers designing sigma-delta ADCs and/or switched-capacitor and continuous-time filters, both beginners and experienced. It is also intended forstudents/academics involved in sigma-delta and analog CAD research.

Graph Theoretic Approaches for Analyzing Large-Scale Social Networks (Hardcover): Natarajan Meghanathan Graph Theoretic Approaches for Analyzing Large-Scale Social Networks (Hardcover)
Natarajan Meghanathan
R5,674 Discovery Miles 56 740 Ships in 18 - 22 working days

Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration

Insider Threats in Cyber Security (Hardcover, 2010 ed.): Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann Insider Threats in Cyber Security (Hardcover, 2010 ed.)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
R2,990 Discovery Miles 29 900 Ships in 18 - 22 working days

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy."

Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies.

Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies (Hardcover, New): Ned Kock Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies (Hardcover, New)
Ned Kock
R4,441 Discovery Miles 44 410 Ships in 18 - 22 working days

With the advent and advancement of E-Collaboration tools, our way of social interaction and online social behavior has altered drastically. With new ways of communicating and working together, we must understand how this affects human behavior. Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies addresses the design and implementation of e-collaboration technologies, assesses its behavioral impact on individuals and groups, and presents theoretical considerations on links between the use of e-collaboration technologies and behavioral patterns. An innovative collection of the latest research findings, this book covers significant topics such as Web-based chat tools, Web-based asynchronous conferencing tools, e-mail, listservs and many others, perfect for academics, researchers, and professionals alike.

Advances in Pervasive Computing and Networking (Hardcover, 2005 ed.): Boleslaw K. Szymanski, B ulent Yener Advances in Pervasive Computing and Networking (Hardcover, 2005 ed.)
Boleslaw K. Szymanski, B ulent Yener
R2,683 Discovery Miles 26 830 Ships in 18 - 22 working days

Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications.

Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters.

The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.

Mapping Scientific Frontiers - The Quest for Knowledge Visualization (Hardcover, 2nd ed. 2014): Chaomei Chen Mapping Scientific Frontiers - The Quest for Knowledge Visualization (Hardcover, 2nd ed. 2014)
Chaomei Chen
R4,096 R3,543 Discovery Miles 35 430 Save R553 (14%) Ships in 10 - 15 working days

This is an examination of the history and the state of the art of the quest for visualizing scientific knowledge and the dynamics of its development. Through an interdisciplinary perspective this book presents profound visions, pivotal advances, and insightful contributions made by generations of researchers and professionals, which portrays a holistic view of the underlying principles and mechanisms of the development of science. This updated and extended second edition: highlights the latest advances in mapping scientific frontiers examines the foundations of strategies, principles, and design patterns provides an integrated and holistic account of major developments across disciplinary boundaries "Anyone who tries to follow the exponential growth of the literature on citation analysis and scientometrics knows how difficult it is to keep pace. Chaomei Chen has identified the significant methods and applications in visual graphics and made them clear to the uninitiated. Derek Price would have loved this book which not only pays homage to him but also to the key players in information science and a wide variety of others in the sociology and history of science." - Eugene Garfield "This is a wide ranging book on information visualization, with a specific focus on science mapping. Science mapping is still in its infancy and many intellectual challenges remain to be investigated and many of which are outlined in the final chapter. In this new edition Chaomei Chen has provided an essential text, useful both as a primer for new entrants and as a comprehensive overview of recent developments for the seasoned practitioner." - Henry Small Chaomei Chen is a Professor in the College of Information Science and Technology at Drexel University, Philadelphia, USA, and a ChangJiang Scholar at Dalian University of Technology, Dalian, China. He is the Editor-in-Chief of Information Visualization and the author of Turning Points: The Nature of Creativity (Springer, 2012) and Information Visualization: Beyond the Horizon (Springer, 2004, 2006).

Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks - Proceedings of the European COST... Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks - Proceedings of the European COST Telecommunications Symposium (Hardcover, 2002 ed.)
A. Nejat Ince
R2,880 Discovery Miles 28 800 Ships in 18 - 22 working days

Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium will be of interest to network designers, developers, and operators. This book is a collection of papers given at the European Cost Telecommunications Symposium. The Symposium was broken down into four sessions: Modelling and Simulation. Teletraffic Modelling. Communications Networks Simulation. Problems in Simulation. Each session addressed a wide spectrum of subjects. The symposium covered nearly all of the important aspects of simulation modeling and tools for the design and performance evaluation of communication techniques and systems. Emerging techniques were emphasized. Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium is a useful reference work for practicing engineers and academic researchers.

Security in E-Learning (Hardcover, 2005 ed.): Edgar R. Weippl Security in E-Learning (Hardcover, 2005 ed.)
Edgar R. Weippl
R2,657 Discovery Miles 26 570 Ships in 18 - 22 working days

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. 'Security for E-Learning' discusses typical threats to e-learning projects and will introduce how these issues have been and should be addressed.

Wireless Ad-Hoc Networks (Hardcover): Timothy Kolaya Wireless Ad-Hoc Networks (Hardcover)
Timothy Kolaya
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days
Information Assurance - Managing Organizational IT Security Risks (Paperback): Joseph Boyce, Daniel Jennings Information Assurance - Managing Organizational IT Security Risks (Paperback)
Joseph Boyce, Daniel Jennings
R2,204 Discovery Miles 22 040 Ships in 10 - 15 working days

Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted information security posture to both public and private corporations and government run agencies.
There is a growing concern among all corporations and within the security industry to come up with new approaches to measure an organization's information security risks and posture. Information Assurance explains and defines the theories and processes that will help a company protect its proprietary information including:
* The need to assess the current level of risk.
* The need to determine what can impact the risk.
* The need to determine how risk can be reduced.

The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defense in depth, configuration management, IA legal issues, and the importance of establishing an IT baseline are covered in-depth from an organizational and managerial decision-making perspective.
* Experience-based theory provided in a logical and comprehensive manner.
* Management focused coverage includes establishing an IT security posture, implementing organizational awareness and training, and understanding the dynamics of new technologies.
* Numerous real-world examples provide a baseline for assessment and comparison.

I-Way Robbery - Crime on the Internet (Paperback): William C. Boni, Gerald L. Kovacich I-Way Robbery - Crime on the Internet (Paperback)
William C. Boni, Gerald L. Kovacich
R2,356 Discovery Miles 23 560 Ships in 10 - 15 working days

I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures.
I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset protection - especially those who have on and off ramps connected to the I-Way.
Boni and Kovacich start with the basics and teach users about the internet before teaching them about the security risks. This addresses the subject from the non-information systems perspective and educates the average user about the overall risks and appropriate protective measures they should enforce and follow.
This book is a must-have for anyone with an interest in the pitfalls and precautions of doing business on the internet.

I-Way Robbery: Crime on the Internet, uniquely approaches the much talked about topic of Internet Crime and security. It is written for anyone who wants a basic understanding of the Internet crime environment now and into the 21st Century. It covers related Internet business, government, global, laws, politics and privacy issues; techniques being used to commit crimes; what can be done about it; and what challenges the future may hold including topics such as information warfare.
Drawing on their decades of experience in high-technology and Internet crime investigations William Boni and Dr. Gerald L. Kovacich have written not only an excellent reference book for business and government agency managers, small business owners, and teachers, but for anyone who drives along the I-Way.
Addresses the subject of internet security from the non-information systems perspective
Detailed incident reports to fully illustrate the specific issues readers must understand to fully appreciate the risks of I-Way activity
Covers a broad range of issues

Switching Theory - Insight through Predicate Logic (Hardcover, 2004 ed.): Shimon Peter Vingron Switching Theory - Insight through Predicate Logic (Hardcover, 2004 ed.)
Shimon Peter Vingron
R2,889 Discovery Miles 28 890 Ships in 18 - 22 working days

The author’s main concern is to promote understanding of the basic ideas underlying switching theory. Nothing is taken for granted, whether it is the concept of a logic variable, that of feedback in a latch or sequential circuit, or the necessity to encode internal states. This very basic and thorough approach enables the development of new concepts such as Composition, or Verification. The theoretical side is enhanced by using predicate (instead of propositional) logic allowing for formal proofs till now unattainable. On the practical side, sequential circuits that hitherto were obtained intuitively are now open to a formal synthesis procedure.

Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Paperback): Mark Sachleben Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Paperback)
Mark Sachleben
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. This book provides significant evidence that there are multiple motivations that lead states to participate in human rights treaties.

An Introduction to ATM Networks (Hardcover): H.G. Perros An Introduction to ATM Networks (Hardcover)
H.G. Perros
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

Asynchronous Transfer Mode (ATM) has revolutionized telecommunications, and has become an integral part of the networking infrastructure.

This introductory well-structured text on ATM networks describes their development, architecture, congestion control, deployment, and signalling in an intuitive, accessible way. It covers extensive background information and includes exercises that support the explanations throughout the book.

The networking expert Harry G. Perros explains ATM networks, including such hot topics as:

  • ATM adaptation layer 2

  • Quality of Service

  • Congestion control

  • Tag switching and MPLS (Multi-Protocol Label Switching)

  • ADSL-based access networks

  • Signalling

  • PNNI (Private Network Node Interface)
An Introduction to ATM Networks is a textbook for graduate and undergraduate students in electrical engineering and computer science as well as a reference work for networking engineers.

Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the... Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the Performance and Management of Complex Communication Networks (PMCCN'97) 17-21 November 1997, Tsukuba Science City, Japan (Hardcover, 1998 ed.)
Toshiharu Hasegawa, Hideaki Takagi, Yukata Takahashi
R4,226 Discovery Miles 42 260 Ships in 18 - 22 working days

With the proliferation of ISDN and mobile communication systems, modern commu nication networks are becoming larger-scale, higher-speed, and more complex than ever before. Therefore, besides hardware development, extensive research on system technolo gies with respect to the performance evaluation and management is indispensable for the proper design, development and operation of future complex communication networks. The International Conference on the Performance and Management of Complex Com munication Systems (PMCCN '97) was held from November 17 to 21, 1997, at Tsukuba Science City, Japan. This was the fifth international conference on the performance as pects of communication networks held every three years in Japan (1985 in Tokyo; 1988, 1991, and 1994 in Kyoto). The conference was sponsored by the International Federa tion of Information Processing (IFIP) Working Group (WG) 6.3 Performance of Com munication Systems, and 7.3 Computer System Modelling, University of Tsukuba, Kyoto University, and The Telecommunication Advancement Foundation (TAF)."

A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to... A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (Hardcover, 2013 ed.)
Jurgen Muller
R3,005 R1,834 Discovery Miles 18 340 Save R1,171 (39%) Ships in 10 - 15 working days

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999): Ragunathan Rajkumar Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999)
Ragunathan Rajkumar
R2,757 Discovery Miles 27 570 Ships in 18 - 22 working days

Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

5G Core Networks - Powering Digitalization (Paperback): Stefan Rommer, Peter Hedman, Magnus Olsson, Lars Frid, Shabnam Sultana,... 5G Core Networks - Powering Digitalization (Paperback)
Stefan Rommer, Peter Hedman, Magnus Olsson, Lars Frid, Shabnam Sultana, …
R2,509 Discovery Miles 25 090 Ships in 10 - 15 working days

5G Core Networks: Powering Digitalization provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications. Written by the authors who are heavily involved in development of the 5G standards and who wrote the successful book on EPC and 4G Packet Networks, this book provides an authoritative reference on the technologies and standards of the 3GPP 5G Core network. Content includes: An overview of the 5G Core Architecture The Stand-Alone and Non-Stand-Alone Architectures Detailed presentation of 5G Core key concepts An overview of 5G Radio and Cloud technologies Learn The differences between the 5G Core network and previous core network generations How the interworking with previous network standards is defined Why certain functionality has been included and what is beyond the scope of 5G Core How the specifications relate to state-of-the-art web-scale concepts and virtualization technologies Details of the protocol and service descriptions Examples of network deployment options

Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016): Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo,... Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016)
Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo, Tania Tronco
R2,447 R1,817 Discovery Miles 18 170 Save R630 (26%) Ships in 10 - 15 working days

This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integration of LTE network and satellite, test environment, power amplifiers and so on. It is useful for researchers in the field of mobile communications.

Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and... Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 September 1997, Paris, France (Hardcover, 1997 ed.)
Dominique Gaiti
R5,407 Discovery Miles 54 070 Ships in 18 - 22 working days

International Conference Intelligent Network and Intelligence in Networks (2IN97) French Ministry of Telecommunication, 20 Avenue de Segur, Paris -France September 2-5, 1997 Organizer: IFIP WG 6.7 -Intelligent Networks Sponsorship: IEEE, Alcatel, Ericsson, France Telecom, Nokia, Nordic Teleoperators, Siemens, Telecom Finland, Lab. PRiSM Aim of the conference To identify and study current issues related to the development of intelligent capabilities in networks. These issues include the development and distribution of services in broadband and mobile networks. This conference belongs to a series of IFIP conference on Intelligent Network. The first one took place in Lappeeranta August 94, the second one in Copenhagen, August 95. The proceedings of both events have been published by Chapman&Hall. IFIP Working Group 6.7 on IN has concentrated with the research and development of Intelligent Networks architectures. First the activities have concentrated in service creation, service management, database issues, feature interaction, IN performance and advanced signalling for broadband services. Later on the research activities have turned towards the distribution of intelligence in networks and IN applications to multimedia and mobility. The market issues of new services have also been studied. From the system development point of view, topics from OMG and TINA-C have been considered.

AWS Elemental MediaTailor User Guide (Hardcover): Documentation Team AWS Elemental MediaTailor User Guide (Hardcover)
Documentation Team
R883 Discovery Miles 8 830 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690

 

Partners