![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book expands the foundations of general systems theory to enable progress beyond the rich heuristic practices available today. It establishes a foundational framework for the development of scientific transdisciplinary systems principles and shows how these can amplify the potential of individuals and teams working in multi-, inter- and transdisciplinary contexts or striving to translate their progress across disciplinary boundaries. Three general scientific systems principles are presented, and their relevance to the design, analysis, management and transformation of systems is explored. Applying lessons from the history and philosophy science, this book disambiguates key concepts of general systemology, clarifies the role of general systemology within the field of systemology, and explains how general systemology supports other forms of transdisciplinarity. These insights are used to develop new perspectives, strategies and tools for addressing long-standing challenges to the advancement and transdisciplinary application of general insights into the nature of complex systems.The material presented in this book includes comprehensive models of the structure of systemology as a disciplinary field, the structure and significance of the general systems worldview, and the role of general systemology as the heart of systems science, systems engineering and systems practice. It explains what a fully-fledged general theory of systems would look like, what its potential is, what routes are available to us to develop it further, and how to leverage the knowledge we have attained so far. Many examples and analogies show how general systemology has the potential to enable scientific discovery, insightful theory building, and practical innovation in all the disciplines as they study, design, nurture or transform complex systems. This book is essential reading for anyone wishing to master the concepts, terminology, models and strategies needed to make effective use of current general systems knowledge and to engage in the further development of the philosophy, science, and practice of general systemology.
Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.
Blockchain is a technology that transcends cryptocurrencies. There are other services in different sectors of the economy that can benefit from the trust and security that blockchains offer. For example, financial institutions are using blockchains for international money transfer, and in logistics, it has been used for supply chain management and tracking of goods. As more global companies and governments are experimenting and deploying blockchain solutions, it is necessary to compile knowledge on the best practices, strategies, and failures in order to create a better awareness of how blockchain could either support or add value to other services. Cross-Industry Use of Blockchain Technology and Opportunities for the Future provides emerging research highlighting the possibilities inherent in blockchain for different sectors of the economy and the added value blockchain can provide for the future of these different sectors. Featuring coverage on a broad range of topics such as data privacy, information sharing, and digital identity, this book is ideally designed for IT specialists, consultants, design engineers, cryptographers, service designers, researchers, academics, government officials, and industry professionals.
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?
Windows Server 2003 Security Infrastructures is a must for anyone
that wants to know the nuts and bolts of Windows Server 2003
security and wants to leverage the operating system's security
infrastructure components to build a more secure I.T.
infrastructure. The primary goal of this book is to provide
insights into the security features and technologies of the Windows
Server 2003 operating system. It also highlights the security
principles an architect should remember when designing an
infrastructure that is rooted on the Windows Server 2003 OS.
Today, information communication technologies, such as the Internet and World Wide Web, are inextricably woven into the fabric of social and economic development. These changes are happening locally as well as globally, and the impact is transformational everywhere. Networked Communities: Strategies for Digital Collaboration looks at best practices in building sustainable community development to explain not only how but why. This unique book contains extensive referencing and sophisticated analysis in the ways communities are using information communication technologies to secure a more prosperous future.
In the digital era, information is the most valuable resource, and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein."
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.
Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.
This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.
Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
Advances in computing technology and internet-worked environments have driven profound realignments not only in the dynamics of technologically mediated interpersonal interactions but also in the way organizations engage with consumers, producers, and other businesses. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications provides managers and academicians with a comprehensive review of innovations and trends in virtual organizations. Covering topics such as knowledge creation and management, virtual customer networks, e-commerce, and virtual communities this reference book offers incisive analysis of the full spectrum of technologies, applications, practices, and outcomes within this growing field.
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.
This book is a study of the power to monitor what is said, authorize who may speak, and even to determine what is and is not knowable within the context of electronic discourse communities. It tests the claim that the Internet and other wide-area networking systems promote participatory democracies and may serve as agencies for communal change by enabling the formation of resisting subjectivities.
Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.
To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Social media is a useful tool for developing the relationships between businesses and consumers. Building Brand Identity in the Age of Social Media: Emerging Research and Opportunities is a critical scholarly resource that examines the media consumption and habits of consumers to evaluate the challenges of brand building. Featuring coverage on a broad range of topics such as brand identity, brand loyalty, and social media branding, this book is geared towards marketing professionals, business managers, and individuals interested in how social media fits into today's marketing environments. |
You may like...
Guide to Computer Forensics and…
Amelia Phillips, Bill Nelson, …
Paperback
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
|