0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (857)
  • R500+ (13,719)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Propagation Engineering in Wireless Communications (Hardcover, 2nd ed. 2016): Abdollah Ghasemi, Ali Abedi, Farshid Ghasemi Propagation Engineering in Wireless Communications (Hardcover, 2nd ed. 2016)
Abdollah Ghasemi, Ali Abedi, Farshid Ghasemi
R4,662 R3,591 Discovery Miles 35 910 Save R1,071 (23%) Ships in 10 - 15 working days

This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

Amazon Comprehend Developer Guide (Hardcover): Documentation Team Amazon Comprehend Developer Guide (Hardcover)
Documentation Team
R892 Discovery Miles 8 920 Ships in 18 - 22 working days
Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017): Mihaly Makai, Janos Vegh Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017)
Mihaly Makai, Janos Vegh
R4,641 R3,570 Discovery Miles 35 700 Save R1,071 (23%) Ships in 10 - 15 working days

This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants. It also offers a brief overview of the corresponding techniques at research and materials testing reactors. The book combines detailed descriptions of the theoretical background and fundamental underlying principles as well as the practical applications of core surveillance. It not only provides numerous industrial examples to illustrate how complex computerized systems are able to support the safe operation of nuclear reactors, but also outlines some new application areas that were made possible only by state-of-the-art computing resources. Thanks to its practical approach, it serves as a valuable and practical reference book for readers interested in the surveillance of nuclear reactors, ranging from undergraduate and postgraduate students to researchers and experts working at research reactors and nuclear power plants, as well as at nuclear regulatory authorities.

Smart Grids and Their Communication Systems (Hardcover, 1st ed. 2019): Ersan Kabalci, Yasin Kabalci Smart Grids and Their Communication Systems (Hardcover, 1st ed. 2019)
Ersan Kabalci, Yasin Kabalci
R5,953 Discovery Miles 59 530 Ships in 18 - 22 working days

The book presents a broad overview of emerging smart grid technologies and communication systems, offering a helpful guide for future research in the field of electrical engineering and communication engineering. It explores recent advances in several computing technologies and their performance evaluation, and addresses a wide range of topics, such as the essentials of smart grids for fifth generation (5G) communication systems. It also elaborates the role of emerging communication systems such as 5G, internet of things (IoT), IEEE 802.15.4 and cognitive radio networks in smart grids. The book includes detailed surveys and case studies on current trends in smart grid systems and communications for smart metering and monitoring, smart grid energy storage systems, modulations and waveforms for 5G networks. As such, it will be of interest to practitioners and researchers in the field of smart grid and communication infrastructures alike.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Privacy Solutions and Security Frameworks in Information Protection (Hardcover): Hamid R. Nemati Privacy Solutions and Security Frameworks in Information Protection (Hardcover)
Hamid R. Nemati
R4,922 Discovery Miles 49 220 Ships in 18 - 22 working days

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.

Smart Buildings Digitalization, Two Volume Set (Hardcover): O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban Smart Buildings Digitalization, Two Volume Set (Hardcover)
O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban
R6,695 Discovery Miles 66 950 Ships in 10 - 15 working days

A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.

Corporate Networks - Strategic Use of Telecommunications (Hardcover): Thomas Valovic Corporate Networks - Strategic Use of Telecommunications (Hardcover)
Thomas Valovic
R2,447 Discovery Miles 24 470 Ships in 18 - 22 working days

An in-depth analysis of how the Fortune 1000 companies have dealt with the strategic use of computers and communications, what applications have been successful and which have faltered, and how upcoming technologies will provide the foundation for a new generation of strategic applications.

Enabling the Internet of Things - From Integrated Circuits to Integrated Systems (Hardcover, 1st ed. 2017): Massimo Alioto Enabling the Internet of Things - From Integrated Circuits to Integrated Systems (Hardcover, 1st ed. 2017)
Massimo Alioto
R4,897 Discovery Miles 48 970 Ships in 18 - 22 working days

This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).

Asynchronous Transfer Mode Networks - Proceedings of TRICOMM '93 Held in Raleigh, North Carolina, April 20-22, 1993... Asynchronous Transfer Mode Networks - Proceedings of TRICOMM '93 Held in Raleigh, North Carolina, April 20-22, 1993 (Hardcover)
Yannis Viniotis, Raif O. Onvural
R2,436 Discovery Miles 24 360 Ships in 18 - 22 working days

Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.

Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover): Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover)
R4,577 Discovery Miles 45 770 Ships in 18 - 22 working days

Modern military coalition operations rely on the ability of multiple independently developed networks to function cohesively, allowing information collected by different sources to be transmitted, analyzed, processed, and provided to troops involved in tactical operations. Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,583 Discovery Miles 25 830 Ships in 18 - 22 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

Data Communications & Networks - An Engineering Approach (Hardcover): J. Irvine Data Communications & Networks - An Engineering Approach (Hardcover)
J. Irvine
R1,892 Discovery Miles 18 920 Ships in 18 - 22 working days

Data Communications and Networks uses a top-down, Internet-focussed approach to tackle the problem of communication system design. An integrated approach is taken to networks and data communications, with an emphasis that starts from the top level requirements and works downwards, describing how such requirements are fulfilled by lower layers of the transmission chain. While the book contains sufficient detail to provide an excellent foundation, clarity is paramount and care is taken not to swamp the reader with information to the point where the underlying concepts are obscured.

The Internet is used as the principle example of a communication system, allowing the reader to follow the system from the application layers, with source coding and security, through the network, with naming and routing algorithms, down to transport and physical aspects of a communication system. Modern techniques such as mobile radio, Voice over IP, and ASDL, are covered, while more traditional aspects such as circuit switching, which still form a significant part of current systems, are not overlooked.

By providing a technical introduction and including application examples, this text will have significant appeal to final year students, postgraduates and professionals with a science or engineering background wishing to gain a basic understanding of the key concepts behind data communications engineering.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover): J. M. Pierson Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover)
J. M. Pierson
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. Discusses measurement and modeling of the energy consumption method Includes methods for energy consumption reduction in diverse computing environments Features a variety of case studies and examples of energy reduction and assessment Timely and important, Large-Scale Distributed Systems and Energy Efficiency is an invaluable resource for ways of increasing the energy efficiency of computing systems and networks while simultaneously reducing the carbon footprint.

The Role of SDN in Broadband Networks (Hardcover, 1st ed. 2017): Hassan Habibi Gharakheili The Role of SDN in Broadband Networks (Hardcover, 1st ed. 2017)
Hassan Habibi Gharakheili
R3,172 Discovery Miles 31 720 Ships in 18 - 22 working days

This thesis focuses on the design and use of software defined networking (SDN) in residential Internet service providers (ISPs), as well as innovative operational models that can be incorporated in broadband ecosystems. Though SDN addresses the challenges for bundled best-effort service provided by broadband operators for users, it does not distinguish between the different types of applications (video streaming, web-browsing, and large file transfers), nor does it cater to the varying needs of different household devices (entertainment tablets, work laptops, or connected appliances). This is a problem for end-users, who want to differentiate between applications and devices; for content providers (CPs), who want to exercise control over streams of high monetary value; and for Internet service providers (ISPs), who have to accommodate growing traffic volumes without additional revenues. This book develops a series of solution techniques that use SDN to find an optimal balance between the competing requirements of end-users, ISPs, and CPs. In addition to the design and discussions of various architectures, it provides technical details on real-world system implementations and prototypes. As such, it offers a valuable resource for researchers, network architects, network strategists, developers, and all other readers seeking to learn more about the practical value of SDN in future ISP networks.

Frontier and Innovation in Future Computing and Communications (Hardcover, 2014): James J (Jong Hyuk) Park, Albert Zomaya, Hwa... Frontier and Innovation in Future Computing and Communications (Hardcover, 2014)
James J (Jong Hyuk) Park, Albert Zomaya, Hwa Young Jeong, Mohammad Obaidat
R7,867 Discovery Miles 78 670 Ships in 18 - 22 working days

IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.

Security in Fixed and Wireless Networks 2e (Hardcover, 2nd Edition): G. Schaefer Security in Fixed and Wireless Networks 2e (Hardcover, 2nd Edition)
G. Schaefer
R2,995 Discovery Miles 29 950 Ships in 10 - 15 working days

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.

Advances in Delay-tolerant Networks (DTNs) - Architecture and Enhanced Performance (Hardcover): Joel J. P. C. Rodrigues Advances in Delay-tolerant Networks (DTNs) - Architecture and Enhanced Performance (Hardcover)
Joel J. P. C. Rodrigues
R6,147 Discovery Miles 61 470 Ships in 10 - 15 working days

Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Security in Smart Cities: Models, Applications, and Challenges (Hardcover, 1st ed. 2019): Aboul Ella Hassanien, Mohamed... Security in Smart Cities: Models, Applications, and Challenges (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed, Amit Kumar Singh
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.

A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition): Floyd Wilder A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition)
Floyd Wilder
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing. The second edition also features: an enhanced description of IP, including IPv6, plus examples of dynamic routing such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and RADIUS; a revised description of FTP; and an added description of HTTP.

Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019): Song Guo, Deze Zeng Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019)
Song Guo, Deze Zeng
R3,805 Discovery Miles 38 050 Ships in 18 - 22 working days

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

Amazon Glacier Developer Guide (Hardcover): Documentation Team Amazon Glacier Developer Guide (Hardcover)
Documentation Team
R1,977 Discovery Miles 19 770 Ships in 18 - 22 working days
Charging Communication Networks - From Theory to Practice (Hardcover): D.J. Songhurst Charging Communication Networks - From Theory to Practice (Hardcover)
D.J. Songhurst
R3,210 Discovery Miles 32 100 Ships in 18 - 22 working days

This book proposes that usage-based charging schemes are essential to generate the incentives necessary for efficient operation of multiservice networks. The rapid development of network technology is enabling sophisticated new services and applications which demand new charging models. The same technology provides the means to operate the right charging schemes.Some of the work done in the European collaborative project CA$hMAN (Charging and Accounting Schemes in Multiservice ATM Networks). This project combined performance and economic models of network resource usage and cutomer utility to construct simple but effective charging schemes which were implemented and trialled in an advanced management platform.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
5G NR - The Next Generation Wireless…
Erik Dahlman, Stefan Parkvall, … Paperback R2,062 Discovery Miles 20 620
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Digital Health - Mobile and Wearable…
Shabbir Syed-Abdul, Xinxin Zhu, … Paperback R2,525 Discovery Miles 25 250

 

Partners