0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Wireless Public Safety Networks 2 - A Systematic Approach (Hardcover): Daniel Camara, Navid Nikaein Wireless Public Safety Networks 2 - A Systematic Approach (Hardcover)
Daniel Camara, Navid Nikaein
R4,136 R2,842 Discovery Miles 28 420 Save R1,294 (31%) Ships in 12 - 19 working days

Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. This book examines past communication failures that have directly contributed to the loss of lives, giving readers in-depth discussions of the public networks that impact emergency management, covering social media, crowdsourcing techniques, wearable wireless sensors, moving-cells scenarios, mobility management protocols, 5G networks, broadband networks, data dissemination, and the resources of the frequency spectrum.

Electronic Hive Minds on Social Media - Emerging Research and Opportunities (Hardcover): Shalin Hai-Jew Electronic Hive Minds on Social Media - Emerging Research and Opportunities (Hardcover)
Shalin Hai-Jew
R5,534 Discovery Miles 55 340 Ships in 10 - 15 working days

Researchers have harnessed the flood of personal information and opinions shared on social media platforms in a variety of ways. People communicate not only what they imagine they are purposely sharing but also unintentionally leak information, which allows others to glimpse a sense of the subconscious and unconscious at a macro level. Electronic Hive Minds on Social Media: Emerging Research and Opportunities explores various research techniques to profile the electronic hive mind around social topics as expressed on various modalities of social media, from human, bot, and cyborg social media accounts, and proposes new research methods for harnessing public data from social media platforms. Highlighting topics such as knowledge sharing, swarm intelligence, and social psychology, this publication is designed for researchers, social psychologists, practitioners, and students in marketing, communications, mass media, and similar fields.

Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction (Hardcover): Sam Takavarasha Jr, Carl... Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction (Hardcover)
Sam Takavarasha Jr, Carl Adams
R5,315 Discovery Miles 53 150 Ships in 10 - 15 working days

As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction is a relevant scholarly publication that examines the importance of information and communications technology (ICT) and its ability to aid in developing countries and the methods to make such technologies more accessible and cost less. Featuring coverage on a wide range of topics, including community networks, infrastructure sharing, and the digital divide, this book is geared toward academics, technology developers, researchers, students, practitioners, and professionals interested in the importance of understanding technological innovations.

RFID and Wireless Sensors Using Ultra-Wideband Technology (Hardcover): Angel Ramos, Antonio Lazaro, David Girbau, Ramon... RFID and Wireless Sensors Using Ultra-Wideband Technology (Hardcover)
Angel Ramos, Antonio Lazaro, David Girbau, Ramon Villarino
R2,620 R2,467 Discovery Miles 24 670 Save R153 (6%) Ships in 12 - 19 working days

RFID and Wireless Sensors using Ultra-Wideband Technology explores how RFID-based technologies are becoming the first choice to realize the last (wireless) link in the chain between each element and the Internet due to their low cost and simplicity. Each day, more and more elements are being connected to the Internet of Things. In this book, ultra-wideband radio technology (in time domain) is exploited to realize this wireless link. Chipless, semi-passive and active RFID systems and wireless sensors and prototypes are proposed in terms of reader (setup and signal processing techniques) and tags (design, integration of sensors and performance). The authors include comprehensive theories, proposals of advanced techniques, and their implementation to help readers develop time-domain ultra-wideband radio technology for a variety of applications. This book is suitable for post-doctoral candidates, experienced researchers, and engineers developing RFID, tag antenna designs, chipless RFID, and sensor integration.

Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback): Vasileios Karyotis, M. H. R.... Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback)
Vasileios Karyotis, M. H. R. Khouzani
R2,440 R2,305 Discovery Miles 23 050 Save R135 (6%) Ships in 12 - 19 working days

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Tools and Techniques for Software Development in Large Organizations - Emerging Research and Opportunities (Hardcover): Vishnu... Tools and Techniques for Software Development in Large Organizations - Emerging Research and Opportunities (Hardcover)
Vishnu Pendyala
R5,757 Discovery Miles 57 570 Ships in 10 - 15 working days

The development of software has expanded substantially in recent years. As these technologies continue to advance, well-known organizations have begun implementing these programs into the ways they conduct business. These large companies play a vital role in the economic environment, so understanding the software that they utilize is pertinent in many aspects. Researching and analyzing the tools that these corporations use will assist in the practice of software engineering and give other organizations an outline of how to successfully implement their own computational methods. Tools and Techniques for Software Development in Large Organizations: Emerging Research and Opportunities is an essential reference source that discusses advanced software methods that prominent companies have adopted to develop high quality products. This book will examine the various devices that organizations such as Google, Cisco, and Facebook have implemented into their production and development processes. Featuring research on topics such as database management, quality assurance, and machine learning, this book is ideally designed for software engineers, data scientists, developers, programmers, professors, researchers, and students seeking coverage on the advancement of software devices in today's major corporations.

Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover): Suyel Namasudra, Hamid Sarbazi-Azad Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover)
Suyel Namasudra, Hamid Sarbazi-Azad
R5,344 R4,476 Discovery Miles 44 760 Save R868 (16%) Ships in 12 - 19 working days

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,935 Discovery Miles 89 350 Ships in 10 - 15 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R821 Discovery Miles 8 210 Ships in 12 - 19 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

Blockchain: Empowering Digital Economy (Hardcover): Yang Yan, Bin Wang, Jun Zou Blockchain: Empowering Digital Economy (Hardcover)
Yang Yan, Bin Wang, Jun Zou
R2,326 Discovery Miles 23 260 Ships in 10 - 15 working days

Big data has been upgraded to our national strategy and has become a catalyst for national and local economic development. With the further promotion of big data and artificial intelligence (AI), the new business model needs to optimize and upgrade. The integration of the blockchain industry will fully implement the digital China strategy and promote the application of big data in China.This unique compendium gives a comprehensive understanding of the blockchain content through the path of technological innovation. It enables readers to fully understand the role of blockchain in promoting the digital economy.The volume will be a useful reference guide for relevant personnel in state ministries and commissions, state-owned enterprises, big data, AI, as well as teachers, researchers and students in higher education institutions.

Amazon Simple Storage Service Console User Guide (Hardcover): Documentation Team Amazon Simple Storage Service Console User Guide (Hardcover)
Documentation Team
R1,252 Discovery Miles 12 520 Ships in 10 - 15 working days
Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,834 Discovery Miles 58 340 Ships in 10 - 15 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Wireless Public Safety Networks Volume 1 - Overview and Challenges (Hardcover): Daniel Camara, Navid Nikaein Wireless Public Safety Networks Volume 1 - Overview and Challenges (Hardcover)
Daniel Camara, Navid Nikaein
R4,133 R2,839 Discovery Miles 28 390 Save R1,294 (31%) Ships in 12 - 19 working days

Wireless Public Safety Networks, Volume One: Overview and Challenges presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or as support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. Wireless Public Safety Networks examines past communication failures that have directly contributed to the loss of lives. This book will give readers a broad view of the PSNs field, analyzing the benefits PSNs may bring to society, the main challenges related to the establishment and maintenance of these networks, the latest advancements in the field, and future perspectives.

Machine Learning for Cyber Security (Hardcover): Preeti Malik, Lata Nautiyal, Mangey Ram Machine Learning for Cyber Security (Hardcover)
Preeti Malik, Lata Nautiyal, Mangey Ram
R5,070 Discovery Miles 50 700 Ships in 12 - 19 working days

This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.

Open and Equal Access for Learning in School Management (Hardcover): Fahriye Altinay Open and Equal Access for Learning in School Management (Hardcover)
Fahriye Altinay
R3,363 Discovery Miles 33 630 Ships in 10 - 15 working days
A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,354 Discovery Miles 13 540 Ships in 12 - 19 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Amazon Relational Database Service User Guide (Hardcover): Documentation Team Amazon Relational Database Service User Guide (Hardcover)
Documentation Team
R3,202 Discovery Miles 32 020 Ships in 10 - 15 working days
An Architecture for Fast and General Data Processing on Large Clusters (Hardcover): Matei Zaharia An Architecture for Fast and General Data Processing on Large Clusters (Hardcover)
Matei Zaharia
R1,988 Discovery Miles 19 880 Ships in 10 - 15 working days

The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,768 Discovery Miles 77 680 Ships in 10 - 15 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Cyberspace (Hardcover): Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid Cyberspace (Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
R3,336 Discovery Miles 33 360 Ships in 10 - 15 working days
Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,863 Discovery Miles 98 630 Ships in 10 - 15 working days
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,732 Discovery Miles 57 320 Ships in 10 - 15 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

AWS Migration Hub User Guide (Hardcover): Documentation Team AWS Migration Hub User Guide (Hardcover)
Documentation Team
R968 Discovery Miles 9 680 Ships in 10 - 15 working days
Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback): Sushil K. Prasad,... Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback)
Sushil K. Prasad, Anshul Gupta, Arnold L. Rosenberg, Alan Sussman, Charles C Weems, Jr.
R1,576 Discovery Miles 15 760 Ships in 12 - 19 working days

Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.

Internet Congestion Control (Paperback): Subir Varma Internet Congestion Control (Paperback)
Subir Varma
R1,671 Discovery Miles 16 710 Ships in 12 - 19 working days

Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Quantitative Semantics and Soft…
Ramon F. Brena, Adolfo Guzman-Arenas Hardcover R4,948 Discovery Miles 49 480
Principles, Methodologies, and…
Xiaoyu Yang, Lu Liu Hardcover R5,143 Discovery Miles 51 430
JAVA Programming for Beginners - The…
Tim Warren Hardcover R599 R543 Discovery Miles 5 430
DelphiMVCFramework - the official guide…
Daniele Teti Hardcover R1,444 Discovery Miles 14 440
Fullstack D3 and Data Visualization…
Amelia Wattenberger Hardcover R2,707 Discovery Miles 27 070
The Definitive Guide to Berkeley DB XML
Danny Brian Hardcover R1,591 Discovery Miles 15 910
Kaizen - How to Apply Lean Kaizen to…
Greg Caldwell Hardcover R631 R564 Discovery Miles 5 640
Foundations of Java for ABAP Programmers
Alistair Rooney Hardcover R1,552 Discovery Miles 15 520
Securing the Internet of Things…
Information Reso Management Association Hardcover R11,237 Discovery Miles 112 370
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,720 Discovery Miles 97 200

 

Partners