0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,587)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computational Inference and Control of Quality in Multimedia Services (Hardcover, 1st ed. 2015): Vlado Menkovski Computational Inference and Control of Quality in Multimedia Services (Hardcover, 1st ed. 2015)
Vlado Menkovski
R3,290 R1,791 Discovery Miles 17 910 Save R1,499 (46%) Ships in 10 - 15 working days

This thesis focuses on the problem of optimizing the quality of network multimedia services. This problem spans multiple domains, from subjective perception of multimedia quality to computer networks management. The work done in this thesis approaches the problem at different levels, developing methods for modeling the subjective perception of quality based on objectively measurable parameters of the multimedia coding process as well as the transport over computer networks. The modeling of subjective perception is motivated by work done in psychophysics, while using Machine Learning techniques to map network conditions to the human perception of video services. Furthermore, the work develops models for efficient control of multimedia systems operating in dynamic networked environments with the goal of delivering optimized Quality of Experience. Overall this thesis delivers a set of methods for monitoring and optimizing the quality of multimedia services that adapt to the dynamic environment of computer networks in which they operate.

Cloud Computing for Optimization: Foundations, Applications, and Challenges (Hardcover, 1st ed. 2018): Bhabani Shankar Prasad... Cloud Computing for Optimization: Foundations, Applications, and Challenges (Hardcover, 1st ed. 2018)
Bhabani Shankar Prasad Mishra, Himansu Das, Satchidananda Dehuri, Alok Kumar Jagadev
R4,167 R3,596 Discovery Miles 35 960 Save R571 (14%) Ships in 10 - 15 working days

This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems - ranging from social science to engineering sciences - can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.

Cosine-/Sine-Modulated Filter Banks - General Properties, Fast Algorithms and Integer Approximations (Hardcover, 1st ed. 2018):... Cosine-/Sine-Modulated Filter Banks - General Properties, Fast Algorithms and Integer Approximations (Hardcover, 1st ed. 2018)
Vladimir Britanak, K.R. Rao
R5,328 Discovery Miles 53 280 Ships in 18 - 22 working days

This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.

Wireless Information Highways (Hardcover, New): Dimitrios Katsaros, Alexandros Nanopoulos, Yannis Manolopoulos Wireless Information Highways (Hardcover, New)
Dimitrios Katsaros, Alexandros Nanopoulos, Yannis Manolopoulos
R2,306 Discovery Miles 23 060 Ships in 18 - 22 working days

Wireless Information Highways provides an excellent introduction and balanced coverage of the most important topics related to the methodologies developed to support data management in asymmetric communication environments. This book is based on a number of self-contained chapters and provides an opportunity for practitioners and researchers to explore the connection between various computer science techniques and develop solutions to problems that arise in the rapidly emerging field of wireless networks.

On the Line - Business Education in the Digital Age (Hardcover, 1st ed. 2018): Anshuman Khare, Deborah Hurst On the Line - Business Education in the Digital Age (Hardcover, 1st ed. 2018)
Anshuman Khare, Deborah Hurst
R3,735 R3,475 Discovery Miles 34 750 Save R260 (7%) Ships in 10 - 15 working days

This book presents different perspectives of online business education - how it is designed, delivered and how it supports advances in management disciplines. The authors describe online platforms in their provision of timely, excellent and relevant business education. The book starts by examining the emergence of online business education. It offers insights for use to business educators in design and implementation of online learning. It presents and discusses technologies for class facilitation and collaboration including tools used to bring content and issues to life. Disruptive approaches and new directions in online business education are examined. The book is ideal for business educators, administrators, as well as business practitioners that have an interest in delivering high quality business education using online platforms and tools. On the Line: Business Education in the Digital Age is divided into three sections. Section 1 presents papers on "why" business education is viable and sustainable in today's context. Treating education as a service, this section describes new techniques for creating a better online business education experience. It also looks at the role advanced data analytics can play in enhancing the quality of online business education. Section 2 delves into "how" online business education works. It presents conceptual models for teaching in specific disciplines, learning design that describes what business educators do and how programs work. This section also addresses performance assessments and quality assurance measures that help to demonstrate the efficacy of online pedagogy. Practical applied papers are used in this section to highlight the use of learning platforms, tools and their application specific to businesses that build knowledge and skills and make students 'work ready'. Finally Section 3 of the book addresses the "so what?" or the outcomes and impacts of online business education. This section targets where business education needs to take learning next, for example to support sustainable business, ethical decision making and inclusive and collaborative leadership. Chapters deal with topics such as how distributed online environments may work better to support knowledge and soft skill building directly relevant for organizations today. Other learning outcomes showing the value of online business education are discussed. Academics, alumni and consultants from over fifteen institutions and organizations around the world contributed to this book.

Handbook of Software Engineering (Hardcover, 1st ed. 2019): Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang Handbook of Software Engineering (Hardcover, 1st ed. 2019)
Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang
R5,237 Discovery Miles 52 370 Ships in 18 - 22 working days

This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.

Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Security and Privacy in Smart Sensor Networks (Hardcover): Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui Security and Privacy in Smart Sensor Networks (Hardcover)
Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui
R5,399 Discovery Miles 53 990 Ships in 18 - 22 working days

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.

Python Passive Network Mapping - P2NMAP (Paperback): Chet Hosmer Python Passive Network Mapping - P2NMAP (Paperback)
Chet Hosmer
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Handbook of Research on Contemporary Theoretical Models in Information Systems (Hardcover): Yogesh K. Dwivedi, Banita Lal, M.... Handbook of Research on Contemporary Theoretical Models in Information Systems (Hardcover)
Yogesh K. Dwivedi, Banita Lal, M. D. Williams, Scott L Schneberger
R6,771 Discovery Miles 67 710 Ships in 18 - 22 working days

Theory is considered to be the bedrock of academic research, often being viewed as the foundation upon which scientific enquiry is organized and built. Despite its ubiquity throughout information systems research, there is much that remains unknown about theory. The Handbook of Research on Contemporary Theoretical Models in Information Systems provides a comprehensive overview and coverage of various theories, models, and related approaches used within information systems research. A defining collection of field advancements, this Handbook of Research offers examples and descriptions of real-world applications of various theories based on empirical studies.

Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019): Song Guo, Deze Zeng Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019)
Song Guo, Deze Zeng
R3,805 Discovery Miles 38 050 Ships in 18 - 22 working days

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

Propagation Engineering in Wireless Communications (Hardcover, 2nd ed. 2016): Abdollah Ghasemi, Ali Abedi, Farshid Ghasemi Propagation Engineering in Wireless Communications (Hardcover, 2nd ed. 2016)
Abdollah Ghasemi, Ali Abedi, Farshid Ghasemi
R4,662 R3,591 Discovery Miles 35 910 Save R1,071 (23%) Ships in 10 - 15 working days

This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,583 Discovery Miles 25 830 Ships in 18 - 22 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

Privacy Solutions and Security Frameworks in Information Protection (Hardcover): Hamid R. Nemati Privacy Solutions and Security Frameworks in Information Protection (Hardcover)
Hamid R. Nemati
R4,922 Discovery Miles 49 220 Ships in 18 - 22 working days

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.

Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in... Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in Hungary (Hardcover, 1st ed. 2016)
Laszlo Nadai, Jozsef Padanyi
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.

Enabling the Internet of Things - From Integrated Circuits to Integrated Systems (Hardcover, 1st ed. 2017): Massimo Alioto Enabling the Internet of Things - From Integrated Circuits to Integrated Systems (Hardcover, 1st ed. 2017)
Massimo Alioto
R4,897 Discovery Miles 48 970 Ships in 18 - 22 working days

This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).

Asynchronous Transfer Mode Networks - Proceedings of TRICOMM '93 Held in Raleigh, North Carolina, April 20-22, 1993... Asynchronous Transfer Mode Networks - Proceedings of TRICOMM '93 Held in Raleigh, North Carolina, April 20-22, 1993 (Hardcover)
Yannis Viniotis, Raif O. Onvural
R2,436 Discovery Miles 24 360 Ships in 18 - 22 working days

Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.

Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover): Maurice Dawson, Mohamed Eltayeb, Marwan Omar Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover)
Maurice Dawson, Mohamed Eltayeb, Marwan Omar
R5,374 Discovery Miles 53 740 Ships in 18 - 22 working days

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Cloud Computing: Security and Management (Hardcover): Conor Suarez Cloud Computing: Security and Management (Hardcover)
Conor Suarez
R3,167 R2,870 Discovery Miles 28 700 Save R297 (9%) Ships in 18 - 22 working days
Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover): Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover)
R4,577 Discovery Miles 45 770 Ships in 18 - 22 working days

Modern military coalition operations rely on the ability of multiple independently developed networks to function cohesively, allowing information collected by different sources to be transmitted, analyzed, processed, and provided to troops involved in tactical operations. Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.

Smart Grids and Their Communication Systems (Hardcover, 1st ed. 2019): Ersan Kabalci, Yasin Kabalci Smart Grids and Their Communication Systems (Hardcover, 1st ed. 2019)
Ersan Kabalci, Yasin Kabalci
R5,953 Discovery Miles 59 530 Ships in 18 - 22 working days

The book presents a broad overview of emerging smart grid technologies and communication systems, offering a helpful guide for future research in the field of electrical engineering and communication engineering. It explores recent advances in several computing technologies and their performance evaluation, and addresses a wide range of topics, such as the essentials of smart grids for fifth generation (5G) communication systems. It also elaborates the role of emerging communication systems such as 5G, internet of things (IoT), IEEE 802.15.4 and cognitive radio networks in smart grids. The book includes detailed surveys and case studies on current trends in smart grid systems and communications for smart metering and monitoring, smart grid energy storage systems, modulations and waveforms for 5G networks. As such, it will be of interest to practitioners and researchers in the field of smart grid and communication infrastructures alike.

Corporate Networks - Strategic Use of Telecommunications (Hardcover): Thomas Valovic Corporate Networks - Strategic Use of Telecommunications (Hardcover)
Thomas Valovic
R2,447 Discovery Miles 24 470 Ships in 18 - 22 working days

An in-depth analysis of how the Fortune 1000 companies have dealt with the strategic use of computers and communications, what applications have been successful and which have faltered, and how upcoming technologies will provide the foundation for a new generation of strategic applications.

Combating Spyware in the Enterprise - Discover, Detect, and Eradicate the Internet's Greatest Threat (Paperback): Paul... Combating Spyware in the Enterprise - Discover, Detect, and Eradicate the Internet's Greatest Threat (Paperback)
Paul Piccard
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.
Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
* A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005
* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors"

Data Communications & Networks - An Engineering Approach (Hardcover): J. Irvine Data Communications & Networks - An Engineering Approach (Hardcover)
J. Irvine
R1,892 Discovery Miles 18 920 Ships in 18 - 22 working days

Data Communications and Networks uses a top-down, Internet-focussed approach to tackle the problem of communication system design. An integrated approach is taken to networks and data communications, with an emphasis that starts from the top level requirements and works downwards, describing how such requirements are fulfilled by lower layers of the transmission chain. While the book contains sufficient detail to provide an excellent foundation, clarity is paramount and care is taken not to swamp the reader with information to the point where the underlying concepts are obscured.

The Internet is used as the principle example of a communication system, allowing the reader to follow the system from the application layers, with source coding and security, through the network, with naming and routing algorithms, down to transport and physical aspects of a communication system. Modern techniques such as mobile radio, Voice over IP, and ASDL, are covered, while more traditional aspects such as circuit switching, which still form a significant part of current systems, are not overlooked.

By providing a technical introduction and including application examples, this text will have significant appeal to final year students, postgraduates and professionals with a science or engineering background wishing to gain a basic understanding of the key concepts behind data communications engineering.

A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition): Floyd Wilder A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition)
Floyd Wilder
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing. The second edition also features: an enhanced description of IP, including IPv6, plus examples of dynamic routing such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and RADIUS; a revised description of FTP; and an added description of HTTP.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830

 

Partners