0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (277)
  • R250 - R500 (885)
  • R500+ (13,597)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots (Paperback): Hailong Huang, Andrey V.... Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots (Paperback)
Hailong Huang, Andrey V. Savkin, Chao Huang
R2,763 Discovery Miles 27 630 Ships in 10 - 15 working days

Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wireless sensor networks and cellular networks. For wireless sensor networks, the book presents approaches using mobile robots or UAVs to collect sensory data from sensor nodes. For cellular networks, it discusses the approaches to using UAVs to work as aerial base stations to serve cellular users. In addition, the book covers the challenges involved in these two networks, existing approaches (e.g., how to use the public transportation vehicles to play the role of mobile sinks to collect sensory data from sensor nodes), and potential methods to address open questions.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 1... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 1 (Hardcover)
Information R Management Association
R12,620 Discovery Miles 126 200 Ships in 18 - 22 working days
Amazon Kinesis Firehose Developer Guide (Hardcover): Development Team Amazon Kinesis Firehose Developer Guide (Hardcover)
Development Team
R886 Discovery Miles 8 860 Ships in 18 - 22 working days
Advances in Malware and Data-Driven Network Security (Hardcover): Brij B. Gupta Advances in Malware and Data-Driven Network Security (Hardcover)
Brij B. Gupta
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

Amazon CloudFront Developer Guide (Hardcover): Documentation Team Amazon CloudFront Developer Guide (Hardcover)
Documentation Team
R1,511 Discovery Miles 15 110 Ships in 18 - 22 working days
Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover): Mohit Dua, Ankit Kumar Jain Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover)
Mohit Dua, Ankit Kumar Jain
R7,962 Discovery Miles 79 620 Ships in 18 - 22 working days

The artificial intelligence subset machine learning has become a popular technique in professional fields as many are finding new ways to apply this trending technology into their everyday practices. Two fields that have majorly benefited from this are pattern recognition and information security. The ability of these intelligent algorithms to learn complex patterns from data and attain new performance techniques has created a wide variety of uses and applications within the data security industry. There is a need for research on the specific uses machine learning methods have within these fields, along with future perspectives. Machine Learning Techniques for Pattern Recognition and Information Security is a collection of innovative research on the current impact of machine learning methods within data security as well as its various applications and newfound challenges. While highlighting topics including anomaly detection systems, biometrics, and intrusion management, this book is ideally designed for industrial experts, researchers, IT professionals, network developers, policymakers, computer scientists, educators, and students seeking current research on implementing machine learning tactics to enhance the performance of information security.

AWS Certificate Manager User Guide (Hardcover): Documentation Team AWS Certificate Manager User Guide (Hardcover)
Documentation Team
R909 Discovery Miles 9 090 Ships in 18 - 22 working days
Cybersecurity for Connected Medical Devices (Paperback): Arnab Ray Cybersecurity for Connected Medical Devices (Paperback)
Arnab Ray
R2,061 Discovery Miles 20 610 Ships in 10 - 15 working days

The cybersecurity of connected medical devices is one of the biggest challenges facing healthcare today. The compromise of a medical device can result in severe consequences for both patient health and patient data. Cybersecurity for Connected Medical Devices covers all aspects of medical device cybersecurity, with a focus on cybersecurity capability development and maintenance, system and software threat modeling, secure design of medical devices, vulnerability management, and integrating cybersecurity design aspects into a medical device manufacturer's Quality Management Systems (QMS). This book is geared towards engineers interested in the medical device cybersecurity space, regulatory, quality, and human resources specialists, and organizational leaders interested in building a medical device cybersecurity program.

Handbook of Research on Cyber Approaches to Public Administration and Social Policy (Hardcover): Fahri OEzsungur Handbook of Research on Cyber Approaches to Public Administration and Social Policy (Hardcover)
Fahri OEzsungur
R7,977 Discovery Miles 79 770 Ships in 18 - 22 working days

During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.

Inclusive Radio Communications for 5G and Beyond (Paperback): Claude Oestges, Francois Quitin Inclusive Radio Communications for 5G and Beyond (Paperback)
Claude Oestges, Francois Quitin
R2,896 Discovery Miles 28 960 Ships in 10 - 15 working days

Inclusive Radio Communication Networks for 5G and Beyond is based on the COST IRACON project that consists of 500 researchers from academia and industry, with 120 institutions from Europe, US and the Far East involved. The book presents state-of-the-art design and analysis methods for 5G (and beyond) radio communication networks, along with key challenges and issues related to the development of 5G networks. This book is Open Access and was funded by: CNIT - Consorzio Nazionale Interuniversitario per le Telecomunicazioni European Association for Communications and Networking (EURACON), AISBL

Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition): David R. Bull, Fan Zhang Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition)
David R. Bull, Fan Zhang
R2,606 Discovery Miles 26 060 Ships in 10 - 15 working days

Intelligent Image and Video Compression: Communicating Pictures, Second Edition explains the requirements, analysis, design and application of a modern video coding system. It draws on the authors' extensive academic and professional experience in this field to deliver a text that is algorithmically rigorous yet accessible, relevant to modern standards and practical. It builds on a thorough grounding in mathematical foundations and visual perception to demonstrate how modern image and video compression methods can be designed to meet the rate-quality performance levels demanded by today's applications and users, in the context of prevailing network constraints. "David Bull and Fan Zhang have written a timely and accessible book on the topic of image and video compression. Compression of visual signals is one of the great technological achievements of modern times, and has made possible the great successes of streaming and social media and digital cinema. Their book, Intelligent Image and Video Compression covers all the salient topics ranging over visual perception, information theory, bandpass transform theory, motion estimation and prediction, lossy and lossless compression, and of course the compression standards from MPEG (ranging from H.261 through the most modern H.266, or VVC) and the open standards VP9 and AV-1. The book is replete with clear explanations and figures, including color where appropriate, making it quite accessible and valuable to the advanced student as well as the expert practitioner. The book offers an excellent glossary and as a bonus, a set of tutorial problems. Highly recommended!" --Al Bovik

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R1,018 Discovery Miles 10 180 Ships in 10 - 15 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4 (Hardcover)
Information R Management Association
R12,633 Discovery Miles 126 330 Ships in 18 - 22 working days
Advances in Delay-Tolerant Networks (DTNs) - Architecture and Enhanced Performance (Paperback, 2nd edition): Joel J. P. C.... Advances in Delay-Tolerant Networks (DTNs) - Architecture and Enhanced Performance (Paperback, 2nd edition)
Joel J. P. C. Rodrigues
R4,669 Discovery Miles 46 690 Ships in 10 - 15 working days

Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection.

Amazon Athena User Guide (Hardcover): Documentation Team Amazon Athena User Guide (Hardcover)
Documentation Team
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days
The Human Cloud - How Today's Changemakers Use Artificial Intelligence and the Freelance Economy to Transform Work... The Human Cloud - How Today's Changemakers Use Artificial Intelligence and the Freelance Economy to Transform Work (Paperback)
Matthew Mottola, Matthew Douglas Coatney
R540 R444 Discovery Miles 4 440 Save R96 (18%) Ships in 10 - 15 working days

Empower yourself with the knowledge to keep up with the rapidly changing technical world of work, as two workforce productivity and technology experts lay out a clear picture of the?coming?revolution?in how work is done and how jobs are shaped. If you listen to the news, robots are coming for your job. Full-time employment will soon be a thing of the past as organizations opt more to hire employees on a contract basis.?With technological advances across email, video, project management, and instant messaging platforms, being tied to a desk working full time for one company is becoming obsolete. So, where does that leave you? The Human Cloud may be the most important book you read to prepare for how work is done in the future. In these pages, human cloud technologist Matthew Mottola and AI expert Matthew Coatney help you not only clearly understand the transition you see happening around you, but they will also help you take advantage of it. In The Human Cloud, Mottola and Coatney inform you about topics including: How employees and employers will be able to take advantage of the new automated and freelance-based workplace. How they will be able to take advantage of the new technology disruptions the machine cloud will create. Why the changes employees and employers are seeing aren't the projection of doom that many are predicting. How to navigate the coming job marketplace. By replacing fear with knowledge, you will better understand how this shift in employment is a good thing, be equipped to embrace the positive?advantages new technology brings, and further secure how your own job is shaped so you are never left behind.

Tactile Internet - with Human-in-the-Loop (Paperback): Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe,... Tactile Internet - with Human-in-the-Loop (Paperback)
Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe, Meryem Simsek, …
R2,596 Discovery Miles 25 960 Ships in 10 - 15 working days

Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations. The book promotes the concept of the Tactile Internet for remote closed-loop human-machine interaction and describes the main challenges and key technologies. Current standardization activities in the field for IEEE and IETF are also described, making this book an ideal resource for researchers, graduate students, and industry R&D engineers in communications engineering, electronic engineering, and computer engineering.

AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide (Hardcover): Documentation Team AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide (Hardcover)
Documentation Team
R1,173 Discovery Miles 11 730 Ships in 18 - 22 working days
The Digital Pivot - Secrets of Online Marketing (Hardcover): Eric Schwartzman The Digital Pivot - Secrets of Online Marketing (Hardcover)
Eric Schwartzman; Foreword by Pogue
R660 Discovery Miles 6 600 Ships in 10 - 15 working days
AWS Database Migration Service Step-by-Step Migration Guide (Hardcover): Documentation Team AWS Database Migration Service Step-by-Step Migration Guide (Hardcover)
Documentation Team
R1,144 Discovery Miles 11 440 Ships in 18 - 22 working days
Computer Programming The Doctrine 2.0 - Full Breakdown of HTML, Python, C, C++, Coding Raspberry PI, Java, SQL, HTML and Black... Computer Programming The Doctrine 2.0 - Full Breakdown of HTML, Python, C, C++, Coding Raspberry PI, Java, SQL, HTML and Black Hat Hacking. (Hardcover)
Adesh Silva
R698 R621 Discovery Miles 6 210 Save R77 (11%) Ships in 18 - 22 working days
AWS CodeBuild User Guide (Hardcover): Documentation Team AWS CodeBuild User Guide (Hardcover)
Documentation Team
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days
Amazon GuardDuty User Guide (Hardcover): Documentation Team Amazon GuardDuty User Guide (Hardcover)
Documentation Team
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days
Amazon Kinesis Video Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Video Streams Developer Guide (Hardcover)
Documentation Team
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days
Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017): Richard Jiang,... Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017)
Richard Jiang, Somaya Al-Maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi
R4,834 Discovery Miles 48 340 Ships in 10 - 15 working days

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bootsy Collins: North Sea Jazz 1998
Bootsy Collins DVD R128 Discovery Miles 1 280
Reliability Modelling and Analysis in…
Unnikrishnan Nair, P. G. Sankaran, … Paperback R3,382 R3,163 Discovery Miles 31 630
Yackety Yack [serial]; 1959
University of North Carolina at Chape Hardcover R1,013 Discovery Miles 10 130
Nina Simone Collection
Nina Simone CD R240 R113 Discovery Miles 1 130
Basic mathematics for economics students…
Derek Yu Paperback R420 Discovery Miles 4 200
Integrated Population Biology and…
Arni S.R. Srinivasa Rao, C.R. Rao Hardcover R4,853 Discovery Miles 48 530
Best Books gegradeerde leesreeks: Vlak 1…
Best Books Paperback R108 Discovery Miles 1 080
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter Paperback R1,382 R1,304 Discovery Miles 13 040
Bokani Dyer - Radio Sechaba
Bokani Dyer CD R113 Discovery Miles 1 130
Ultrissima On the Junk's Moon
Stabat Stable Vinyl record R380 Discovery Miles 3 800

 

Partners