0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (321)
  • R250 - R500 (913)
  • R500+ (16,230)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Smart Trajectories - Metamodeling, Reactive Architecture for Analytics, and Smart Applications (Hardcover): Azedine Boulmakoul,... Smart Trajectories - Metamodeling, Reactive Architecture for Analytics, and Smart Applications (Hardcover)
Azedine Boulmakoul, Lamia Karim, Bharat Bhushan
R4,461 Discovery Miles 44 610 Ships in 12 - 17 working days

Highlights developments, discoveries, and practical and advanced experiences related to responsive distributed computing and how it can support the deployment of trajectory-based applications in intelligent systems. Presents metamodeling with new trajectories patterns which are very useful for intelligent transportation systems. Examines the processing aspects of raw trajectories to develop other types of semantic and activity-type and space-time path type trajectories. Discusses Complex Event Processing (CEP), Internet of Things (IoT), Internet of Vehicle (IoV), V2X communication, Big Data Analytics, distributed processing frameworks, and Cloud Computing. Presents a number of case studies to demonstrate smart trajectories related to spatio-temporal events such as traffic congestion, viral contamination, and pedestrian accidents.

Software Defined Networking - Design and Deployment (Paperback): Patricia A. Morreale, James M. Anderson Software Defined Networking - Design and Deployment (Paperback)
Patricia A. Morreale, James M. Anderson
R1,464 Discovery Miles 14 640 Ships in 12 - 17 working days

Software Defined Networking: Design and Deployment provides a comprehensive treatment of software defined networking (SDN) suitable for new network managers and experienced network professionals. Presenting SDN in context with more familiar network services and challenges, this accessible text: Explains the importance of virtualization, particularly the impact of virtualization on servers and networks Addresses SDN, with an emphasis on the network control plane Discusses SDN implementation and the impact on service providers, legacy networks, and network vendors Contains a case study on Google's initial implementation of SDN Investigates OpenFlow, the hand-in-glove partner of SDN Looks forward toward more programmable networks and the languages needed to manage these environments Software Defined Networking: Design and Deployment offers a unique perspective of the business case and technology motivations for considering SDN solutions. By identifying the impact of SDN on traffic management and the potential for network service growth, this book instills the knowledge needed to manage current and future demand and provisioning for SDN.

Practical Cloud Security - A Cross-Industry View (Paperback): Kevin L. Jackson, Melvin B. Greer Jr. Practical Cloud Security - A Cross-Industry View (Paperback)
Kevin L. Jackson, Melvin B. Greer Jr.
R1,436 Discovery Miles 14 360 Ships in 12 - 17 working days

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,466 Discovery Miles 14 660 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

OSPF and IS-IS - From Link State Routing Principles to Technologies (Paperback): Rui Valadas OSPF and IS-IS - From Link State Routing Principles to Technologies (Paperback)
Rui Valadas
R1,469 Discovery Miles 14 690 Ships in 12 - 17 working days

This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature.

From Parallel to Emergent Computing (Paperback): Andrew Adamatzky, Selim Akl, Georgios Ch Sirakoulis From Parallel to Emergent Computing (Paperback)
Andrew Adamatzky, Selim Akl, Georgios Ch Sirakoulis
R1,499 Discovery Miles 14 990 Ships in 12 - 17 working days

Modern computing relies on future and emergent technologies which have been conceived via interaction between computer science, engineering, chemistry, physics and biology. This highly interdisciplinary book presents advances in the fields of parallel, distributed and emergent information processing and computation. The book represents major breakthroughs in parallel quantum protocols, elastic cloud servers, structural properties of interconnection networks, internet of things, morphogenetic collective systems, swarm intelligence and cellular automata, unconventionality in parallel computation, algorithmic information dynamics, localized DNA computation, graph-based cryptography, slime mold inspired nano-electronics and cytoskeleton computers. Features Truly interdisciplinary, spanning computer science, electronics, mathematics and biology Covers widely popular topics of future and emergent computing technologies, cloud computing, parallel computing, DNA computation, security and network analysis, cryptography, and theoretical computer science Provides unique chapters written by top experts in theoretical and applied computer science, information processing and engineering From Parallel to Emergent Computing provides a visionary statement on how computing will advance in the next 25 years and what new fields of science will be involved in computing engineering. This book is a valuable resource for computer scientists working today, and in years to come.

Large Scale Networks - Modeling and Simulation (Paperback): Radu Dobrescu, Florin Ionescu Large Scale Networks - Modeling and Simulation (Paperback)
Radu Dobrescu, Florin Ionescu
R2,109 Discovery Miles 21 090 Ships in 12 - 17 working days

This book offers a rigorous analysis of the achievements in the field of traffic control in large networks, oriented on two main aspects: the self-similarity in traffic behaviour and the scale-free characteristic of a complex network. Additionally, the authors propose a new insight in understanding the inner nature of things, and the cause-and-effect based on the identification of relationships and behaviours within a model, which is based on the study of the influence of the topological characteristics of a network upon the traffic behaviour. The effects of this influence are then discussed in order to find new solutions for traffic monitoring and diagnosis and also for traffic anomalies prediction. Although these concepts are illustrated using highly accurate, highly aggregated packet traces collected on backbone Internet links, the results of the analysis can be applied for any complex network whose traffic processes exhibit asymptotic self-similarity, perceived as an adaptability of traffic in networks. However, the problem with self-similar models is that they are computationally complex. Their fitting procedure is very time-consuming, while their parameters cannot be estimated based on the on-line measurements. In this aim, the main objective of this book is to discuss the problem of traffic prediction in the presence of self-similarity and particularly to offer a possibility to forecast future traffic variations and to predict network performance as precisely as possible, based on the measured traffic history.

Smart Grid in IoT-Enabled Spaces - The Road to Intelligence in Power (Hardcover): Fadi Al-Turjman Smart Grid in IoT-Enabled Spaces - The Road to Intelligence in Power (Hardcover)
Fadi Al-Turjman
R3,107 Discovery Miles 31 070 Ships in 12 - 17 working days

Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.

The Routledge Companion to Management Information Systems (Paperback): Robert Galliers, Mari-Klara Stein The Routledge Companion to Management Information Systems (Paperback)
Robert Galliers, Mari-Klara Stein
R1,784 Discovery Miles 17 840 Ships in 12 - 17 working days

The field of Information Systems has been evolving since the first application of computers in organizations in the early 1950s. Focusing on information systems analysis and design up to and including the 1980s, the field has expanded enormously, with our assumptions about information and knowledge being challenged, along with both intended and unintended consequences of information technology. This prestige reference work offers students and researchers a critical reflection on major topics and current scholarship in the evolving field of Information Systems. This single-volume survey of the field is organized into four parts. The first section deals with Disciplinary and Methodological Foundations. The second section deals with Development, Adoption and Use of MIS - topics that formed the centrepiece of the field of IS in the last century. The third section deals with Managing Organizational IS, Knowledge and Innovation, while the final section considers emerging and continuing issues and controversies in the field - IS in Society and a Global Context. Each chapter provides a balanced overview of current knowledge, identifying issues and discussing relevant debates. This prestigious book is required reading for any student or researcher in Management Information Systems, academics and students covering the breadth of the field, and established researchers seeking a single-volume repository on the current state of knowledge, current debates and relevant literature.

Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover): Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover)
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
R5,330 Discovery Miles 53 300 Ships in 12 - 17 working days

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover): Pethuru Raj, Anupama C. Raman,... Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover)
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
R5,205 Discovery Miles 52 050 Ships in 12 - 17 working days

The Internet of Things (IoT) concept is defined as a flexible and futuristic network where all the different types of devices and smart objects can become seamlessly connected to each other and can actively participate in all types of processes which are happening around us. The grand objective of making physical, mechanical, electrical, and electronic devices to use the deeper and extreme connectivity and service-enablement techniques is to make them intelligent in their deeds, decisions, and deals. Cognitive IoT is the application of cognitive computing technologies to the data which is generated by the connected devices of the IoT ecosystem. Cognition means thinking; however, computers are not yet fully capable of mimicking human like thought. However, the present-day computer systems can perform some functions which are like the capability of human beings to think. Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases explains the concepts surrounding Cognitive IoT. It also looks at the use cases and such supporting technologies as artificial intelligence and machine learning that act as key enablers of Cognitive IoT ecosystem. Different Cognitive IoT enabled platforms like IBM Watson and other product specific use cases like Amazon Alexa are covered in depth. Other highlights of the book include: Demystifying the cognitive computing paradigm Delineating the key capabilities of cognitive cloud environments Deep learning algorithms for cognitive IoT solutions Natural language processing (NLP) methods for cognitive IoT systems Designing a secure infrastructure for cognitive IoT platforms and applications

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R2,442 Discovery Miles 24 420 Ships in 12 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Big Data, IoT, and Machine Learning - Tools and Applications (Hardcover): Rashmi Agrawal, Marcin Paprzycki, Neha Gupta Big Data, IoT, and Machine Learning - Tools and Applications (Hardcover)
Rashmi Agrawal, Marcin Paprzycki, Neha Gupta
R4,445 Discovery Miles 44 450 Ships in 12 - 17 working days

The idea behind this book is to simplify the journey of aspiring readers and researchers to understand Big Data, IoT and Machine Learning. It also includes various real-time/offline applications and case studies in the fields of engineering, computer science, information security and cloud computing using modern tools. This book consists of two sections: Section I contains the topics related to Applications of Machine Learning, and Section II addresses issues about Big Data, the Cloud and the Internet of Things. This brings all the related technologies into a single source so that undergraduate and postgraduate students, researchers, academicians and people in industry can easily understand them. Features Addresses the complete data science technologies workflow Explores basic and high-level concepts and services as a manual for those in the industry and at the same time can help beginners to understand both basic and advanced aspects of machine learning Covers data processing and security solutions in IoT and Big Data applications Offers adaptive, robust, scalable and reliable applications to develop solutions for day-to-day problems Presents security issues and data migration techniques of NoSQL databases

Cyber Security Education - Principles and Policies (Hardcover): Greg Austin Cyber Security Education - Principles and Policies (Hardcover)
Greg Austin
R4,147 Discovery Miles 41 470 Ships in 12 - 17 working days

This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges. The past ten years have seen a tectonic shift in the significance of cyber security education. Once the preserve of small groups of dedicated educators and industry professionals, the subject is now on the frontlines of geopolitical confrontation and business strategy. Global shortages of talent have created pressures on corporate and national policy for workforce development. Cyber Security Education offers an updated approach to the subject as we enter the next decade of technological disruption and political threats. The contributors include scholars and education practitioners from leading research and education centres in Europe, North America and Australia. This book provides essential reference points for education policy on the new social terrain of security in cyberspace and aims to reposition global debates on what education for security in cyberspace can and should mean. This book will be of interest to students of cyber security, cyber education, international security and public policy generally, as well as practitioners and policy-makers.

Blockchain-enabled Fog and Edge Computing - Concepts, Architectures, and Applications (Hardcover): Muhammad Maaz Rehan,... Blockchain-enabled Fog and Edge Computing - Concepts, Architectures, and Applications (Hardcover)
Muhammad Maaz Rehan, Mubashir Husain Rehmani
R2,433 Discovery Miles 24 330 Ships in 12 - 17 working days

This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.

Cybersecurity Fundamentals - A Real-World Perspective (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Cybersecurity Fundamentals - A Real-World Perspective (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R5,800 Discovery Miles 58 000 Ships in 12 - 17 working days

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

Cyber Security Education - Principles and Policies (Paperback): Greg Austin Cyber Security Education - Principles and Policies (Paperback)
Greg Austin
R1,188 Discovery Miles 11 880 Ships in 12 - 17 working days

This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges. The past ten years have seen a tectonic shift in the significance of cyber security education. Once the preserve of small groups of dedicated educators and industry professionals, the subject is now on the frontlines of geopolitical confrontation and business strategy. Global shortages of talent have created pressures on corporate and national policy for workforce development. Cyber Security Education offers an updated approach to the subject as we enter the next decade of technological disruption and political threats. The contributors include scholars and education practitioners from leading research and education centres in Europe, North America and Australia. This book provides essential reference points for education policy on the new social terrain of security in cyberspace and aims to reposition global debates on what education for security in cyberspace can and should mean. This book will be of interest to students of cyber security, cyber education, international security and public policy generally, as well as practitioners and policy-makers.

Testing and Securing Web Applications (Paperback): Ravi Das, Greg Johnson Testing and Securing Web Applications (Paperback)
Ravi Das, Greg Johnson
R1,678 Discovery Miles 16 780 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Testing and Securing Web Applications (Hardcover): Ravi Das, Greg Johnson Testing and Securing Web Applications (Hardcover)
Ravi Das, Greg Johnson
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Digital Economy for Customer Benefit and Business Fairness - Proceedings of the International Conference on Sustainable... Digital Economy for Customer Benefit and Business Fairness - Proceedings of the International Conference on Sustainable Collaboration in Business, Information and Innovation (SCBTII 2019), Bandung, Indonesia, October 9-10, 2019 (Hardcover)
Grisna Anggadwita, Erni Martini
R6,982 Discovery Miles 69 820 Ships in 12 - 17 working days

The international conference "Sustainable Collaboration in Business, Technology, Information and Innovation (SCBTII) 2019" has brought together academics, professionals, entrepreneurs, researchers, learners, and other related groups from around the world who have a special interest in theories and practices in the development of the field of digital economy for global competitiveness. Considering that, at present, technology and industry 4.0 are still a leading trend and offer great opportunities for global businesses, the rise of industry 4.0 makes competition in the business world more attractive, yet fierce. Opportunities and challenges for business development in industry 4.0 are becoming firm and it also provides businesses the possibility to compete globally. Companies that desire to enter this global competition should pay attention to customer benefits and business fairness in order to achieve sustainability in this digital economy. This proceedings volume contains selected papers from this conference and presents opportunities to communicate and exchange new ideas and experiences. Moreover, the conference provided opportunities, both for the presenters and the participants, to establish research relations, and find global partners for future collaboration.

An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Paperback): Nikos Daskalakis, Panagiotis Georgitseas An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Paperback)
Nikos Daskalakis, Panagiotis Georgitseas
R1,209 Discovery Miles 12 090 Ships in 12 - 17 working days

The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.

Systems Approach to the Design of Commercial Aircraft (Hardcover): Scott Jackson, Ricardo Moraes dos Santos Systems Approach to the Design of Commercial Aircraft (Hardcover)
Scott Jackson, Ricardo Moraes dos Santos
R2,489 Discovery Miles 24 890 Ships in 12 - 17 working days

While aviation fatalities have thankfully fallen dramatically in recent years, the phenomena of complexity and cognitive bias have been shown to be factors in many accidents. An understanding of these phenomena promises to bring the fatality rate even lower, and a deeper understanding of commercial aircraft in the context of systems engineering will contribute to that trend. Systems Approach to the Design of Commercial Aircraft describes commercial aircraft from an advanced systems point of view, addressing complexity, cybersecurity, and systems architecting. In addition, it provides an explanation of systems engineering, describes how systems engineering forms a framework for commercial aircraft, covers how systems engineering and systems architecting relate to commercial aircraft, addresses complexity, and shows how humans fit into systems engineering and the importance for commercial aircraft. It goes onto present how cybersecurity plays an important role in the mix and how human interface fits in. The readership includes designers of aircraft, manufacturers, researchers, systems engineers, and students. Scott Jackson is a fellow of the International Council on Systems Engineering (INCOSE) and the author of Systems Engineering for Commercial Aircraft (1997 and 2015) in English and Chinese. Ricardo Moraes dos Santos is a senior systems engineer at EMBRAER S/A and an INCOSE Brazil chapter director. He works with Architecting process (Corporate) and is head of Cybersecurity and Safety (STPA Applications) at EMBRAER S/A.

An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Hardcover): Nikos Daskalakis, Panagiotis Georgitseas An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Hardcover)
Nikos Daskalakis, Panagiotis Georgitseas
R3,523 Discovery Miles 35 230 Ships in 12 - 17 working days

The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.

Swarm Intelligence for Cloud Computing (Hardcover): Indrajit Pan, Mohamed Abd Elaziz, Siddhartha Bhattacharyya Swarm Intelligence for Cloud Computing (Hardcover)
Indrajit Pan, Mohamed Abd Elaziz, Siddhartha Bhattacharyya
R3,245 Discovery Miles 32 450 Ships in 12 - 17 working days

Swarm Intelligence in Cloud Computing is an invaluable treatise for researchers involved in delivering intelligent optimized solutions for reliable deployment, infrastructural stability, and security issues of cloud-based resources. Starting with a bird's eye view on the prevalent state-of-the-art techniques, this book enriches the readers with the knowledge of evolving swarm intelligent optimized techniques for addressing different cloud computing issues including task scheduling, virtual machine allocation, load balancing and optimization, deadline handling, power-aware profiling, fault resilience, cost-effective design, and energy efficiency. The book offers comprehensive coverage of the most essential topics, including: Role of swarm intelligence on cloud computing services Cloud resource sharing strategies Cloud service provider selection Dynamic task and resource scheduling Data center resource management. Indrajit Pan is an Associate Professor in Information Technology of RCC Institute of Information Technology, India. He received his PhD from Indian Institute of Engineering Science and Technology, Shibpur, India. With an academic experience of 14 years, he has published around 40 research publications in different international journals, edited books, and conference proceedings. Mohamed Abd Elaziz is a Lecturer in the Mathematical Department of Zagazig University, Egypt. He received his PhD from the same university. He is the author of more than 100 articles. His research interests include machine learning, signal processing, image processing, cloud computing, and evolutionary algorithms. Siddhartha Bhattacharyya is a Professor in Computer Science and Engineering of Christ University, Bangalore. He received his PhD from Jadavpur University, India. He has published more than 230 research publications in international journals and conference proceedings in his 20 years of academic experience.

CompTIA A+ Complete Certification Kit: Core 1 Exam  220-1101 and Core 2 Exam 220-1102 5th Edition (Paperback, 5th Edition): Q... CompTIA A+ Complete Certification Kit: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 5th Edition (Paperback, 5th Edition)
Q Docter
R2,874 R1,775 Discovery Miles 17 750 Save R1,099 (38%) Ships in 12 - 17 working days

Study, practice, review--the Sybex way! Building on the popular Sybex Study Guide approach, this CompTIA A+ Complete Certification Kit 5th Edition covers all the major changes to the NEW Core 1 220-1101 and Core 2 220-1102 exams. The kit provides the complete Study Guide covering 100% of the A+ exam objectives as well as Practice Tests and a Review Guide that contains clear and concise information on topics including crucial hardware and operating system maintenance, cloud computing, security, and troubleshooting. This must-have kit includes all of the essential tools to help you prepare for exam day: CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102, 5th Edition CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102, 5th Edition CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102, 3rd Edition Including practical examples and insights drawn from real-world experiences, as well as exam highlights and end-of-chapter reviews, this exam prep kit provides readers with access to the Sybex interactive online learning environment and test bank, including hundreds of practice questions, bonus exams, electronic flashcards, and a searchable PDF glossary of the most important exam terminology used in these topics: Mobile Devices Networking Hardware Virtualization and Cloud Computing Hardware and Network Troubleshooting Operating Systems Security Software Troubleshooting Operational Procedures This CompTIA A+ Complete Certification Kit 5th Edition provides complete and updated preparation for the Core 1 220-1101 and Core 2 220-1102 exams.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Hacking For Dummies, 7th Edition
K Beaver Paperback R717 R511 Discovery Miles 5 110
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
Linux Command Line and Shell Scripting…
R. Blum Paperback R980 Discovery Miles 9 800
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
Guide to Networking Essentials
Greg Tomsho Paperback R1,364 R1,222 Discovery Miles 12 220
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,331 R1,194 Discovery Miles 11 940
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360

 

Partners