0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,585)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Security and Quality in Cyber-Physical Systems Engineering - With Forewords by Robert M. Lee and Tom Gilb (Hardcover, 1st ed.... Security and Quality in Cyber-Physical Systems Engineering - With Forewords by Robert M. Lee and Tom Gilb (Hardcover, 1st ed. 2019)
Stefan Biffl, Matthias Eckhart, Arndt Luder, Edgar Weippl
R3,698 Discovery Miles 36 980 Ships in 10 - 15 working days

This book examines the requirements, risks, and solutions to improve the security and quality of complex cyber-physical systems (C-CPS), such as production systems, power plants, and airplanes, in order to ascertain whether it is possible to protect engineering organizations against cyber threats and to ensure engineering project quality. The book consists of three parts that logically build upon each other. Part I "Product Engineering of Complex Cyber-Physical Systems" discusses the structure and behavior of engineering organizations producing complex cyber-physical systems, providing insights into processes and engineering activities, and highlighting the requirements and border conditions for secure and high-quality engineering. Part II "Engineering Quality Improvement" addresses quality improvements with a focus on engineering data generation, exchange, aggregation, and use within an engineering organization, and the need for proper data modeling and engineering-result validation. Lastly, Part III "Engineering Security Improvement" considers security aspects concerning C-CPS engineering, including engineering organizations' security assessments and engineering data management, security concepts and technologies that may be leveraged to mitigate the manipulation of engineering data, as well as design and run-time aspects of secure complex cyber-physical systems. The book is intended for several target groups: it enables computer scientists to identify research issues related to the development of new methods, architectures, and technologies for improving quality and security in multi-disciplinary engineering, pushing forward the current state of the art. It also allows researchers involved in the engineering of C-CPS to gain a better understanding of the challenges and requirements of multi-disciplinary engineering that will guide them in their future research and development activities. Lastly, it offers practicing engineers and managers with engineering backgrounds insights into the benefits and limitations of applicable methods, architectures, and technologies for selected use cases.

Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover): Rebecca Herold, Marcus K. Rogers Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover)
Rebecca Herold, Marcus K. Rogers
R39,414 Discovery Miles 394 140 Ships in 10 - 15 working days

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia's four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available OnlineThis Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]

Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition): R. Anderson, J. D Dewar Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition)
R. Anderson, J. D Dewar; Edited by Harold F. Tipton
R2,283 Discovery Miles 22 830 Ships in 10 - 15 working days

The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)(2) CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)(2) certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Networking in Japanese Factory Automation (Hardcover): Koichi Kishimoto Networking in Japanese Factory Automation (Hardcover)
Koichi Kishimoto
R4,482 Discovery Miles 44 820 Ships in 10 - 15 working days

In Japan information technology has been a vital part of manufacturing for decades. A central factory computer provides a production plan and shop minicomputers and microcomputers in the factory run machines that manufacture products. It has become necessary to connect computers installed at different locations to enable information exchange between different sections. This requires an intracompany network with large memory capacity and high-speed communication capability to process documents, drawings, and image data, as well as conventional code data: a local area network (LAN). This volume discusses the ring-type LAN; the TOSLINE-8000 high-speed optical data highway for high-speed real-time control systems; the TOSLINE-2000E, a compact, low-cost independent local area network; the status of MAP, a communications protocol for manufacturing automation established by General Motors and MAP activities in Japan

Communications Technology Guide for Business (Hardcover): Richard Downey, Etc, Sean Boland, Philip Walsh Communications Technology Guide for Business (Hardcover)
Richard Downey, Etc, Sean Boland, Philip Walsh
R3,157 Discovery Miles 31 570 Ships in 18 - 22 working days

Here's a broad, integrated view of existing communications technologies available world-wide -- including the Internet and Web, digital mobile telephony, ISDN, SMDS, frame relay, and ATM -- from a practical business perspective. Covering both private and public networks, the book offers a basic explanation of a wide range of technologies and describes their underlying principles and features, as well as the factors that differentiate them. The guide also showcases typical applications, exposes inherent limitations, explains pricing and methods of comparison, and discusses security pitfalls and protection systems.

Strengthening SME Performance Through Social Media Adoption and Usage (Hardcover): Sikandar Ali Qalati, Dragana Ostic, Rohit... Strengthening SME Performance Through Social Media Adoption and Usage (Hardcover)
Sikandar Ali Qalati, Dragana Ostic, Rohit Bansal
R6,205 Discovery Miles 62 050 Ships in 18 - 22 working days

Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.

Towards an Optical Internet - New Visions in Optical Network Design and Modelling. IFIP TC6 Fifth Working Conference on Optical... Towards an Optical Internet - New Visions in Optical Network Design and Modelling. IFIP TC6 Fifth Working Conference on Optical Network Design and Modelling (ONDM 2001) February 5-7, 2001, Vienna, Austria (Hardcover, 2002 ed.)
Admela Jukan
R4,231 Discovery Miles 42 310 Ships in 18 - 22 working days

In these exciting times of quotidianly progressing developments in communication techniques, where more than ever in the history of a technological progress, society's reliance on communication networks for medicine, education, data transfer, commerce, and many other endeavours dominates the human's everyday life, the optical networks are certainly one of the most promising and challenging networking options. Since their commercial arrival in the nineties, they have fundamentally changed the way of dealing with traffic engineering by removing bandwidth bottlenecks and eliminating delays. Today, after the revolutionary bandwidth expansion, the networking functionality migrates more and more to the optical layer, and the need to establish fast wavelength circuits and capacity-on-demand for the higher-layer networks, in particular data networks based on Internet Protocol (IP), has become one of the central networking issues for the new century. The unifying trends toward configurable all-optical network infrastructure open up a wide range of new network engineering and design choices dealing with networks' interoperability and common platforms for control and management. The Fifth Working Conference on Optical Network Design and Modelling, held in the Austrian capital Vienna, February 5-7, 2001, aims at presenting the most recent progress in optical communication techniques, new technologies, standardisation process, emerging markets and carriers. A short look at the Table of Contents of this book tells us, in fact, that this year's conference program reflects the current state of the art precisely.

Intelligent Broadband Multimedia Networks - Generic Aspects and Architectures Wireless, ISDN, Current and Future Intelligent... Intelligent Broadband Multimedia Networks - Generic Aspects and Architectures Wireless, ISDN, Current and Future Intelligent Networks (Hardcover, 1997 ed.)
Syed V. Ahamed, Victor B. Lawrence
R6,139 Discovery Miles 61 390 Ships in 18 - 22 working days

Intelligent Broadband Multimedia Networks is a non-mathematical, but highly systems oriented, coverage of modern intelligent information networks. This volume focuses on the convergence of computers and communications technologies. Most of the concepts that are generic to all intelligent networks, and their microscopic and macroscopic functions, are presented. This book includes specific architectures that can be used by network designers and planners, telecommunications managers, computer scientists, and telecommunications professionals. The breadth of this coverage and the systems orientation of this work make the text suitable for use in advanced level courses on intelligent communications networks. The material in this volume ranges from defining intelligent networks to more specific coverage of educational, medical, and knowledge-based networks. Each of the 20 chapters address issues that can help make the transition from computer design, to the underlying concepts of modern telecommunications systems, to considerations necessary for the implementation of intelligent network services. Special and timely coverage of emerging technologies, such as HDSL, ADSL, BISDN, wireless, broadband access, ATM, and other topics, are given expanded treatment. The authors have included design methodologies for installing intelligence into almost any communications systems, and procedures for using such intelligence according to the type of function expected from these networks. Unique features of the book are: a 64-page glossary of key terms (with expanded explanations) used in the field, a 23-page index that makes it easy to search for important information, running headers on each page to help the busy professional use the book as a reference/design tool, complete references including additional reading for more detailed information, and accurate and concise information to help telecommunications professionals understand the intricacies of the field.

Computer and Information Science (Hardcover, 1st ed. 2020): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2020)
Roger Lee
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

This book gathers the outcomes of the 18th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2019), which was held on June 12-14, 2019 in Beijing, China. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them. The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference's most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.

Computer Networks, Global Edition (Paperback, 6th edition): Andrew Tanenbaum, Nick Feamster, David Wetherall Computer Networks, Global Edition (Paperback, 6th edition)
Andrew Tanenbaum, Nick Feamster, David Wetherall
R2,035 R1,643 Discovery Miles 16 430 Save R392 (19%) Ships in 5 - 10 working days

For coursesin Business Data Communication and Networking. Anintroduction to computer networking grounded in real-world examples In Computer Networks,Tanenbaum et al. explain how networks work from the inside out. They start withthe physical layer of networking, computer hardware and transmission systems,then work their way up to network applications. Each chapter follows aconsistent approach: The book presents key principles, then illustrates themutilizing real-world example networks that run through the entire book - theInternet, and wireless networks, including Wireless LANs, broadband wireless,and Bluetooth. The 6th Edition is updated throughout to reflect the mostcurrent technologies, and the chapter on network security is rewritten to focuson modern security principles and actions. Tutorial videos on key networkingtopics and techniques are available to students on the companion website at www.pearsonglobaleditions.com Instructors are supported with a SolutionsManual to end-of-chapter exercises featured in the book, LecturePowerPoint slides, and extracted art and figures featured in thebook.

Cloud Computing Strategies (Hardcover): Dimitris N Chorafas Cloud Computing Strategies (Hardcover)
Dimitris N Chorafas
R4,233 Discovery Miles 42 330 Ships in 10 - 15 working days

A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments. Illustrated with numerous examples and case studies, the book examines security, privacy, data ownership, and data protection in the cloud. It also: Explains how and why your company can benefit from Open Software and onDemand Services Identifies various cloud providers, their services, and their content as a basis for evaluating cost effectiveness Provides authoritative guidance on how to transition from a legacy system to the cloud Includes helpful tips for managing cloud vendor relationships and avoiding vendor lock-in Whether you're already in the cloud or just considering it, the text provides the unbiased understanding of the strengths and weaknesses of cloud computing needed to make informed decisions regarding its future in your organization. The book's strength is that it supplies authoritative insight on everything needed to decide if you should make a transition to the cloud.

Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and... Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and Wireless Communications Networks, August 20-25, 2006, Santiago, Chile (Hardcover, 1992. 2nd Print)
Guy Pujolle
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has been held in a Latin American country.

Topics in this series include:

  • The 4th International Conference on Theoretical Computer Science
  • Education for the 21st Century- Impact of ICT and Digital Resources
  • Mobile and Wireless Communication Networks
  • Ad-Hoc Networking
  • Network Control and Engineering for QoS, Security, and Mobility
  • The Past and Future of Information Systems: 1976-2006 and Beyond
  • History of Computing and Education
  • Biologically Inspired Cooperative Computing
  • Artificial Intelligence in Theory and Practice
  • Applications in Artificial Intelligence
  • Advanced Software Engineering: Expanding the Frontiers of Software

For a complete list of the more than 300 titles in the IFIP Series, visit springer.com.

For more information about IFIP, please visit ifip.org.

Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications,... Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE (Hardcover, 1st ed. 2018)
Jihad Mohamad Alja'am, Abdulmotaleb El Saddik, Abdul Hamid Sadka
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This edited volume presents the best chapters presented during the international conference on computer and applications ICCA'17 which was held in Dubai, United Arab Emirates in September 2017. Selected chapters present new advances in digital information, communications and multimedia. Authors from different countries show and discuss their findings, propose new approaches, compare them with the existing ones and include recommendations. They address all applications of computing including (but not limited to) connected health, information security, assistive technology, edutainment and serious games, education, grid computing, transportation, social computing, natural language processing, knowledge extraction and reasoning, Arabic apps, image and pattern processing, virtual reality, cloud computing, haptics, information security, robotics, networks algorithms, web engineering, big data analytics, ontology, constraints satisfaction, cryptography and steganography, Fuzzy logic, soft computing, neural networks, artificial intelligence, biometry and bio-informatics, embedded systems, computer graphics, algorithms and optimization, Internet of things and smart cities. The book can be used by researchers and practitioners to discover the recent trends in computer applications. It opens a new horizon for research discovery works locally and internationally.

Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022):... Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022)
Vera Roos, Jaco Hoffman
R1,545 Discovery Miles 15 450 Ships in 18 - 22 working days
Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.): Ying Zhang Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.)
Ying Zhang
R7,792 Discovery Miles 77 920 Ships in 18 - 22 working days

This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises... Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises (PRO-VE'03) October 29-31, 2003, Lugano, Switzerland (Hardcover, 2004 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R2,962 Discovery Miles 29 620 Ships in 18 - 22 working days

Processes and Foundations for Virtual Organizations contains selected articles from PRO-VE'03, the Fourth Working Conference on Virtual Enterprises, which was sponsored by the International Federation for Information Processing (IFIP) and held in Lugano, Switzerland in October 2003. This fourth edition includes a rich set of papers revealing the progress and achievements in the main current focus areas:

-VO breeding environments;
-Formation of collaborative networked organizations;
-Ontologies and knowledge management;
-Process models and interoperability;
-Infrastructures;
-Multi-agent approaches. In spite of many valid contributions in these areas, many research challenges remain. This is clearly stated in a number of papers suggesting a new research agenda and strategic research roadmaps for advanced virtual organizations.
With the selected papers included in this book, PRO-VE pursues its double mission as a forum for presentation and discussion of achievements as well as a place to discuss and suggest new directions and research strategies.

The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age... The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age (Hardcover)
Rania Mankarious; Foreword by Laura Berman
R727 Discovery Miles 7 270 Ships in 9 - 17 working days
Distributed Services with OpenAFS - for Enterprise and Education (Hardcover, 2007 ed.): Franco Milicchio, Wolfgang Alexander... Distributed Services with OpenAFS - for Enterprise and Education (Hardcover, 2007 ed.)
Franco Milicchio, Wolfgang Alexander Gehrke
R1,467 Discovery Miles 14 670 Ships in 18 - 22 working days

This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.

Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.): Hanane Fathi, Shyam... Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.)
Hanane Fathi, Shyam S. Chakraborty, Ramjee Prasad
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

karmano hy api boddhavyam boddhavyam ca vikarmanah akarmanas ca boddhavyam gahana karmano gatih The intricacies of action are very hard to understand. Therefore one should know properly what action is, what forbidden action is, and what inaction is. The Bhagvad Gita (4.17) This book is the outcome of the research contribution of Hanane Fathi towards her Ph.D. studies jointly with Shyam S. Chakraborty and Ramjee Prasad as - pervisors. To the best of the authors' knowledge, this is a ?rst book on voice over Internet protocol (VoIP) covering such a broad perspective as illustrated in Figure P.1. This book is a new, forward-looking resource that explores the present and future trends of VoIP in the wireless heterogeneous networks. This book also provides the discovery path that these network infrastructures are following from a perspective of synergies with the present systems and how they will pave the way for future systems. This book is intended for everyone in the ?eld of wireless information and multimedia communications. It provides different levels of material suitable for managers, researchers, network providers, and graduate students. We hope that all readers will experience the bene?ts and power of this knowledge. We have tried our best to make each chapter comprehensive and we cannot claim that this book is without errors. Any remarks to improve the text and correct the errors would be highly appreciated.

Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.): Stefan Axelsson, David Sands Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.)
Stefan Axelsson, David Sands
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection Through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems.

Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000),... Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000), September 14-15, 2000, Gdansk, Poland (Hardcover, 2000 ed.)
Jozef Wozniak, Jerzy Konorski
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

There are numerous factors contributing to the dynamic growth of wireless communication systems we've been observing in the past 10 years, the most important being the increasing network user mobility and the technological advances in high-speed data transmission over radio channels. Research centres and standards-making institutions the world over conduct works on 3G integrated systems of person-to-person and person-to-computer communications, wireless counterparts of classical LAN, ATM and IP architectures, satellite and access networks as well as advanced service platforms like W AP and other concepts. Among the many commercial and non-profit organisations professionally involved in the development of the new information infrastructure, of particular influence is the International Federation for Information Processing. Within its Technical Committee TC-6, a working group WG 6.8 has been set up to co-ordinate IFIP activities in the area of wireless communications. It has done so, among others, by arranging regular meetings of academic and industrial researchers, known as IFIP TC-6 WG 6.8 Workshops on Personal Wireless Communications (pWC). Such workshops were held in recent years in Prague, Frankfurt/M, Tokyo and Copenhagen, and their success has resulted in the promotion of PWC to the status of IFIP Working Conference.

A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover): Mitch Seymour A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover)
Mitch Seymour; Illustrated by Mitch Seymour, Elyse Seymour
R582 Discovery Miles 5 820 Ships in 18 - 22 working days
Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover): Nicola Cranely, Liam Murphy Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover)
Nicola Cranely, Liam Murphy
R6,692 Discovery Miles 66 920 Ships in 18 - 22 working days

The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks. The Handbook of Research on Wireless Multimedia: Quality of Service and Solutions highlights and discusses the underlying QoS issues that arise in the delivery of real-time multimedia services over wireless networks. This cutting-edge book presents state-of-the-art solutions from leading researchers active in the field to address the QoS issues for different wireless multimedia applications.

A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.): Thomas Baigneres, Pascal Junod, Yi Lu, Jean... A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,395 Discovery Miles 13 950 Ships in 10 - 15 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science]Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback): Marvin Hobbs Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback)
Marvin Hobbs
R1,961 Discovery Miles 19 610 Ships in 10 - 15 working days

Multifunction devices combine the essentials of a fax machine, printer, scanner, and copier into one peripheral for small and home offices. As the market for this equipment grows, the need for skilled repair and maintenance increases. Unfortunately the service documentation supplied by the manufacturers is completely inadequate making the repair jobs even harder and more expensive. Marvin Hobbs teaches you how multifunction peripherals work in theory and in practice with lots of hands-on examples and important troubleshooting and repair tips you don't want to miss.
This book fills a gap in the literature, and will be a welcome addition to the library of any technician or do-it-yourselfer.
Written by a knowledgeable practitioner with inside industry information
Fully covers the troubleshooting and repair of multifunction peripherals
A must-have instructional and reference title for anyone who works with computer peripherals

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Research Anthology on Architectures…
Information R Management Association Hardcover R12,630 Discovery Miles 126 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
E-Learning and Digital Education in the…
M. Mahruf C. Shohel Hardcover R3,584 Discovery Miles 35 840
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830

 

Partners