0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (360)
  • R250 - R500 (932)
  • R500+ (14,111)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016): Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo,... Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016)
Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo, Tania Tronco
R2,552 R1,798 Discovery Miles 17 980 Save R754 (30%) Ships in 12 - 17 working days

This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integration of LTE network and satellite, test environment, power amplifiers and so on. It is useful for researchers in the field of mobile communications.

A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to... A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (Hardcover, 2013 ed.)
Jurgen Muller
R3,133 R1,816 Discovery Miles 18 160 Save R1,317 (42%) Ships in 12 - 17 working days

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Insider Threats in Cyber Security (Hardcover, 2010 ed.): Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann Insider Threats in Cyber Security (Hardcover, 2010 ed.)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
R2,933 Discovery Miles 29 330 Ships in 10 - 15 working days

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy."

Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies.

Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Managing Enterprise Content - A Unified Content Strategy (Paperback, 2nd edition): Ann Rockley, Charles Cooper Managing Enterprise Content - A Unified Content Strategy (Paperback, 2nd edition)
Ann Rockley, Charles Cooper
R1,594 Discovery Miles 15 940 Ships in 12 - 17 working days

Smartphones, eBook readers, and tablet computers like the Apple iPad have forever changed the way people access and interact with content. Your customers expect the content you provide them to be adaptive --responding to the device, their location, their situation, and their personalized needs. Authors Ann Rockley and Charles Cooper provide insights and guidelines that will help you develop a unified content strategy-a repeatable, systematic plan that can help you reach your customers, anytime, anywhere, on any device. This up-to-date new edition of Managing Enterprise Content helps you: Determine business requirements Build your vision Design content that adapts to any device Develop content models, metadata, and workflow Put content governance in place Adapt to new and changed roles Identify tools requirements With this book you'll learn to design adaptable content that frees you from the tyranny of an ever increasing array of devices.

Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks - Proceedings of the European COST... Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks - Proceedings of the European COST Telecommunications Symposium (Hardcover, 2002 ed.)
A. Nejat Ince
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium will be of interest to network designers, developers, and operators. This book is a collection of papers given at the European Cost Telecommunications Symposium. The Symposium was broken down into four sessions: Modelling and Simulation. Teletraffic Modelling. Communications Networks Simulation. Problems in Simulation. Each session addressed a wide spectrum of subjects. The symposium covered nearly all of the important aspects of simulation modeling and tools for the design and performance evaluation of communication techniques and systems. Emerging techniques were emphasized. Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium is a useful reference work for practicing engineers and academic researchers.

Analysis of Computer and Communication Networks (Hardcover, 2008): Fayez Gebali Analysis of Computer and Communication Networks (Hardcover, 2008)
Fayez Gebali
R3,178 Discovery Miles 31 780 Ships in 10 - 15 working days

Analysis of Computer and Communication Networks provides the basic techniques for modeling and analyzing two of the fundamental components of high performance networks: switching equipment, and software employed at the end nodes and intermediate switches. The book also reviews the design options used to build efficient switching equipment. Topics covered include Markov chains and queuing analysis, traffic modeling, interconnection networks, and switch architectures and buffering strategies.

This book covers the mathematical theory and techniques necessary for analyzing telecommunication systems. Queuing and Markov chain analyses are provided for many protocols currently in use. The book then discusses in detail applications of Markov chains and queuing analysis to model more than 15 communications protocols and hardware components.

Advances in Pervasive Computing and Networking (Hardcover, 2005 ed.): Boleslaw K. Szymanski, B ulent Yener Advances in Pervasive Computing and Networking (Hardcover, 2005 ed.)
Boleslaw K. Szymanski, B ulent Yener
R2,822 Discovery Miles 28 220 Ships in 10 - 15 working days

Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications.

Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters.

The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.

Application of Social Media in Crisis Management - Advanced Sciences and Technologies for Security Applications (Hardcover, 1st... Application of Social Media in Crisis Management - Advanced Sciences and Technologies for Security Applications (Hardcover, 1st ed. 2017)
Babak Akhgar, Andrew Staniforth, David Waddington
R3,965 Discovery Miles 39 650 Ships in 12 - 17 working days

This book explores how social media and its advances enables citizens to empower themselves during a crisis. The book addresses the key issues related to crises management and social media as the new platform to assist citizens and first responders dealing with multiple forms of crisis, from major terrorist attacks, larger scale public disorder, large-scale movement of people across borders, and natural disasters. The book is based on the results and knowledge gained during the European Commission ATHENA project which has been addressing critical issues in contemporary crisis management and social media and smart mobile communications. This book is authored by a mix of global contributors from across the landscape of academia, emergency response and experts in government policy and private industry. This title explores and explains that during a modern crisis, the public self-organizes into voluntary groups, adapt quickly to changing circumstances, emerge as leaders and experts and perform life-saving actions; and that they are increasingly reliant upon the use of new communications media to do it.

Mobile Big Data (Hardcover, 1st ed. 2018): Xiang Cheng, Luoyang Fang, Liuqing Yang, Shuguang Cui Mobile Big Data (Hardcover, 1st ed. 2018)
Xiang Cheng, Luoyang Fang, Liuqing Yang, Shuguang Cui
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

This book provides a comprehensive picture of mobile big data starting from data sources to mobile data driven applications. Mobile Big Data comprises two main components: an overview of mobile big data, and the case studies based on real-world data recently collected by one of the largest mobile network carriers in China. In the first component, four areas of mobile big data life cycle are surveyed: data source and collection, transmission, computing platform and applications. In the second component, two case studies are provided, based on the signaling data collected in the cellular core network in terms of subscriber privacy evaluation and demand forecasting for network management. These cases respectively give a vivid demonstration of what mobile big data looks like, and how it can be analyzed and mined to generate useful and meaningful information and knowledge. This book targets researchers, practitioners and professors relevant to this field. Advanced-level students studying computer science and electrical engineering will also be interested in this book as supplemental reading.

Network Security First-Step (Paperback, 2nd edition): Thomas Thomas, Donald Stoddard Network Security First-Step (Paperback, 2nd edition)
Thomas Thomas, Donald Stoddard
R1,228 Discovery Miles 12 280 Ships in 12 - 17 working days

Network Security first-stepSecond Edition Tom Thomas and Donald Stoddard Your first step into the world of network security

  • No security experience required
  • Includes clear and easily understood explanations
  • Makes learning easy
Your first step to network security begins here
  • Learn how hacker attacks work, from start to finish
  • Choose the right security solution for each type of risk
  • Create clear and enforceable security policies, and keep them up to date
  • Establish reliable processes for responding to security advisories
  • Use encryption effectively, and recognize its limitations
  • Secure your network with firewalls, routers, and other devices
  • Prevent attacks aimed at wireless networks
No security experience required Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you
TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Hardcover): Rashid Abdelhaleem Saeed, Stephen... TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Hardcover)
Rashid Abdelhaleem Saeed, Stephen J. Shellhammer
R5,468 Discovery Miles 54 680 Ships in 12 - 17 working days

Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.

Cloud Systems in Supply Chains (Hardcover): Fawzy Soliman Cloud Systems in Supply Chains (Hardcover)
Fawzy Soliman
R3,339 Discovery Miles 33 390 Ships in 12 - 17 working days

Cloud Systems in Supply Chains explores the risks that could face supply chain firms if their implementation of cloud systems is not carefully managed or if not appropriately selected and supported. This volume aids supply chain firms in ensuring that their cloud system activities are positioned to assist and sustain their competitive advantages.

Antipatterns - Managing Software Organizations and People, Second Edition (Hardcover, 2nd edition): Colin J. Neill, Philip A.... Antipatterns - Managing Software Organizations and People, Second Edition (Hardcover, 2nd edition)
Colin J. Neill, Philip A. Laplante, Joanna F Defranco
R2,220 Discovery Miles 22 200 Ships in 12 - 17 working days

Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly found in IT, software development, and other business domains. For each antipattern, it describes the situation and symptoms, gives examples, and offers a refactoring solution.

The authors, graduate faculty at Penn State University, avoid an overly scholarly style and infuse the text with entertaining sidebars, cartoons, stories, and jokes. They provide names for the antipatterns that are visual, humorous, and memorable. Using real-world anecdotes, they illustrate key concepts in an engaging manner. This updated edition sheds light on new management and environmental antipattems and includes a new chapter, six updated chapters, and new discussion questions. Topics covered include leadership principles, environmental antipatterns, group patterns, management antipatterns, and team leadership.

Following introductory material on management theory and human behavior, the text catalogs the full range of management, cultural, and environmental antipatterns. It includes thought-provoking exercises that each describe a situation, ask which antipatterns are present, and explain how to refactor the situation. It provides time-tested advice to help you overcome bad practices through successful interaction with your clients, customers, peers, supervisors, and subordinates.

Security in E-Learning (Hardcover, 2005 ed.): Edgar R. Weippl Security in E-Learning (Hardcover, 2005 ed.)
Edgar R. Weippl
R2,793 Discovery Miles 27 930 Ships in 10 - 15 working days

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. 'Security for E-Learning' discusses typical threats to e-learning projects and will introduce how these issues have been and should be addressed.

Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover): Mark S. Merkow, Lakshmikanth Raghavan Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover)
Mark S. Merkow, Lakshmikanth Raghavan
R2,213 Discovery Miles 22 130 Ships in 12 - 17 working days

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:

  • Pre-developed nonfunctional requirements that can be reused for any software development project
  • Documented test cases that go along with the requirements and can be used to develop a Test Plan for the software
  • Testing methods that can be applied to the test cases provided
  • A CD with all security requirements and test cases as well as MS Word versions of the checklists, requirements, and test cases covered in the book

Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle.

Some Praise for the Book:

This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation ... .
Doug Cavit, Chief Security Strategist, Microsoft Corporation

...provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC).
Jeff Weekes, Sr. Security Architect at Terra Verde Services
... full of useful insights and practical advice from two authors who have lived this process. What you get is a tactical application security roadmap that cuts through the noise and is immediately applicable to your projects.
Jeff Williams, Aspect Security CEO and Volunteer Chair of the OWASP Foundation

Ethical Digital Technology in Practice (Paperback): Simon Rogerson Ethical Digital Technology in Practice (Paperback)
Simon Rogerson
R1,582 R1,498 Discovery Miles 14 980 Save R84 (5%) Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Optimization for Communications and Networks (Hardcover): Poompat Saengudomlert Optimization for Communications and Networks (Hardcover)
Poompat Saengudomlert
R3,046 Discovery Miles 30 460 Ships in 12 - 17 working days

"The book provides an introduction to optimization theory and its applications. It is written for senior under-graduate students and first-year graduate students of telecommunication and related fields. Most applications pertain to communication and network problems. Optimization theory involves a great deal of mathematics. The book has practical examples to accompany rigorous discussion so that the reader may develop intuitive understanding on relevant concepts. The materials have been developed from course notes. By attempting to cover convex, linear, and integer optimization for a one-semester course, the author focuses on fundamental concepts and techniques rather than trying to be comprehensive. Infact, the book is written with the main intention to serve as a bridge for students with no prior background in optimization to be able to access more advanced books on the subject later on. "--

Switching Theory - Insight through Predicate Logic (Hardcover, 2004 ed.): Shimon Peter Vingron Switching Theory - Insight through Predicate Logic (Hardcover, 2004 ed.)
Shimon Peter Vingron
R3,045 Discovery Miles 30 450 Ships in 10 - 15 working days

The author’s main concern is to promote understanding of the basic ideas underlying switching theory. Nothing is taken for granted, whether it is the concept of a logic variable, that of feedback in a latch or sequential circuit, or the necessity to encode internal states. This very basic and thorough approach enables the development of new concepts such as Composition, or Verification. The theoretical side is enhanced by using predicate (instead of propositional) logic allowing for formal proofs till now unattainable. On the practical side, sequential circuits that hitherto were obtained intuitively are now open to a formal synthesis procedure.

Wimax: Service Standards and Resource Allocation (Hardcover): Timothy Kolaya Wimax: Service Standards and Resource Allocation (Hardcover)
Timothy Kolaya
R2,914 Discovery Miles 29 140 Ships in 12 - 17 working days
Computer and Information Science (Hardcover, 1st ed. 2020): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2020)
Roger Lee
R2,807 Discovery Miles 28 070 Ships in 10 - 15 working days

This book gathers the outcomes of the 18th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2019), which was held on June 12-14, 2019 in Beijing, China. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them. The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference's most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.

Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999): Ragunathan Rajkumar Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999)
Ragunathan Rajkumar
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Network Security Policies and Procedures (Hardcover, 2007 ed.): Douglas W. Frye Network Security Policies and Procedures (Hardcover, 2007 ed.)
Douglas W. Frye
R2,933 Discovery Miles 29 330 Ships in 10 - 15 working days

Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view the company 's security and will thus be better equipped to act in a way that forwards the company 's goals.

Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the... Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the Performance and Management of Complex Communication Networks (PMCCN'97) 17-21 November 1997, Tsukuba Science City, Japan (Hardcover, 1998 ed.)
Toshiharu Hasegawa, Hideaki Takagi, Yukata Takahashi
R4,347 Discovery Miles 43 470 Ships in 12 - 17 working days

With the proliferation of ISDN and mobile communication systems, modern commu nication networks are becoming larger-scale, higher-speed, and more complex than ever before. Therefore, besides hardware development, extensive research on system technolo gies with respect to the performance evaluation and management is indispensable for the proper design, development and operation of future complex communication networks. The International Conference on the Performance and Management of Complex Com munication Systems (PMCCN '97) was held from November 17 to 21, 1997, at Tsukuba Science City, Japan. This was the fifth international conference on the performance as pects of communication networks held every three years in Japan (1985 in Tokyo; 1988, 1991, and 1994 in Kyoto). The conference was sponsored by the International Federa tion of Information Processing (IFIP) Working Group (WG) 6.3 Performance of Com munication Systems, and 7.3 Computer System Modelling, University of Tsukuba, Kyoto University, and The Telecommunication Advancement Foundation (TAF)."

Fundamentals of Secure System Modelling (Hardcover, 1st ed. 2017): Raimundas Matulevicius Fundamentals of Secure System Modelling (Hardcover, 1st ed. 2017)
Raimundas Matulevicius
R2,350 Discovery Miles 23 500 Ships in 12 - 17 working days

This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.

Advancing Cloud Database Systems and Capacity Planning with Dynamic Applications (Hardcover): Narendra Kumar Kamila Advancing Cloud Database Systems and Capacity Planning with Dynamic Applications (Hardcover)
Narendra Kumar Kamila
R5,541 Discovery Miles 55 410 Ships in 12 - 17 working days

Continuous improvements in data analysis and cloud computing have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Advancing Cloud Database Systems and Capacity Planning with Dynamic Applications is a key resource on the latest innovations in cloud database systems and their impact on the daily lives of people in modern society. Highlighting multidisciplinary studies on information storage and retrieval, big data architectures, and artificial intelligence, this publication is an ideal reference source for academicians, researchers, scientists, advanced level students, technology developers and IT officials.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,631 Discovery Miles 56 310
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,838 Discovery Miles 48 380
Research Anthology on Convergence of…
Information R Management Association Hardcover R12,560 Discovery Miles 125 600
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,212 R1,121 Discovery Miles 11 210

 

Partners