0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (360)
  • R250 - R500 (934)
  • R500+ (14,110)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (Hardcover, 1st ed. 2017)
Yang Xu
R5,548 Discovery Miles 55 480 Ships in 12 - 17 working days

These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear power plants. The papers were selected from more than 80 submissions and presented at the First International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plants, held in Yinchuan, China on May 30 - June 1, 2016. The primary aim of this symposium was to provide a platform to facilitate the discussion for comprehension, application and management of digital instrumentation, control systems and technologies in nuclear power plants. The book reflects not only the state of the art and latest trends in nuclear instrumentation and control system technologies, but also China's increasing influence in this area. It is a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.

Universal Semantic Communication (Hardcover, 2011): Brendan Juba Universal Semantic Communication (Hardcover, 2011)
Brendan Juba
R2,855 Discovery Miles 28 550 Ships in 10 - 15 working days

Is meaningful communication possible between two intelligent parties who share no common language or background? In this work, a theoretical framework is proposed in which it is possible to address when and to what extent such semantic communication is possible: such problems can be rigorously addressed by explicitly focusing on the goals of the communication. Under this framework, it is possible to show that for many goals, communication without any common language or background is possible using universal protocols. This work should be accessible to anyone with an undergraduate-level knowledge of the theory of computation. The theoretical framework presented here is of interest to anyone wishing to design systems with flexible interfaces, either among computers or between computers and their users.

Synthetic Worlds - Emerging Technologies in Education and Economics (Hardcover, 2014 ed.): Andreas Hebbel-Seeger, Torsten... Synthetic Worlds - Emerging Technologies in Education and Economics (Hardcover, 2014 ed.)
Andreas Hebbel-Seeger, Torsten Reiners, Dennis Schaffer
R4,812 Discovery Miles 48 120 Ships in 12 - 17 working days

Synthetic Worlds, Virtual Worlds, and Alternate Realities are all terms used to describe the phenomenon of computer-based, simulated environments in which users inhabit and interact via avatars. The best-known commercial applications are in the form of electronic gaming, and particularly in massively-multiplayer online role-playing games like World of Warcraft or Second Life. Less known, but possibly more important, is the rapid adoption of platforms in education and business, where Serious Games are being used for training purposes, and even Second Life is being used in many situations that formerly required travel. The editors of this book captures the state of research in the field intended to reflect the rapidly growing yet relatively young market in education and business. The general focus is set on the scientific community but integrates the practical applications for businesses, with papers on information systems, business models, and economics. In six parts, international authors - all experts in their field - discuss the current state-of-the-art of virtual worlds/alternate realities and how the field will develop over the next years. Chapters discuss the influences and impacts in and around virtual worlds. Part four is about education, with a focus on learning environments and experiences, pedagogical models, and the effects on the different roles in the educational sector. The book looks at business models and how companies can participate in virtual worlds while receiving a return on investment, and includes cases and scenarios of integration, from design, implementation to application.

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R758 R641 Discovery Miles 6 410 Save R117 (15%) Ships in 10 - 15 working days
Linear Predictive Coding and the Internet Protocol (Hardcover, New): Robert M. Gray Linear Predictive Coding and the Internet Protocol (Hardcover, New)
Robert M. Gray
R997 Discovery Miles 9 970 Ships in 10 - 15 working days

In December 1974 the first realtime conversation on the ARPAnet took place between Culler-Harrison Incorporated in Goleta, California, and MIT Lincoln Laboratory in Lexington, Massachusetts. This was the first successful application of realtime digital speech communication over a packet network and an early milestone in the explosion of realtime signal processing of speech, audio, images, and video that we all take for granted today. It could be considered as the first voice over Internet Protocol (VoIP), except that the Internet Protocol (IP) had not yet been established. In fact, the interest in realtime signal processing had an indirect, but major, impact on the development of IP. This is the story of the development of linear predictive coded (LPC) speech and how it came to be used in the first successful packet speech experiments. Several related stories are recounted as well. The history is preceded by a tutorial on linear prediction methods which incorporates a variety of views to provide context for the stories. This part is a technical survey of the fundamental ideas of linear prediction that are important for speech processing, but the development departs from traditional treatments and takes advantage of several shortcuts, simplifications, and unifications that come with years of hindsight. In particular, some of the key results are proved using short and simple techniques that are not as well known as they should be, and it also addresses some of the common assumptions made when modeling random signals. Linear Predictive Coding and the Internet Protocol is an insightful and comprehensive review of an underpinning technology of the internet and other packet switched networks. It will be enjoyed by everyone with an interest in past and present real time signal processing on the internet.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R3,962 Discovery Miles 39 620 Ships in 12 - 17 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Amazon QuickSight User Guide (Hardcover): Documentation Team Amazon QuickSight User Guide (Hardcover)
Documentation Team
R2,899 Discovery Miles 28 990 Ships in 10 - 15 working days
Social Customer Relationship Management - Fundamentals, Applications, Technologies (Hardcover, 1st ed. 2020): Rainer Alt, Olaf... Social Customer Relationship Management - Fundamentals, Applications, Technologies (Hardcover, 1st ed. 2020)
Rainer Alt, Olaf Reinhold
R1,829 Discovery Miles 18 290 Ships in 10 - 15 working days

Social media has received considerable attention, and many potential benefits, as well as concerns, are now being discussed. This book explores how social media can successfully support business processes in marketing, sales and service in the context of customer relationship management (CRM). It presents the fundamentals of Social CRM and shows how small and large companies alike have implemented it. In turn, the book presents analytic and operational software tools that offer features for enhancing and streamlining interactions with customers. The book concludes with an overview of essential design areas that businesses need to bear in mind when introducing social media into their CRM strategies. In this regard, it also points out key success factors, limitations, and data protection aspects.

eDemocracy & eGovernment - Stages of a Democratic Knowledge Society (Hardcover, 2012 ed.): Andreas Meier eDemocracy & eGovernment - Stages of a Democratic Knowledge Society (Hardcover, 2012 ed.)
Andreas Meier
R2,813 Discovery Miles 28 130 Ships in 10 - 15 working days

The reference bookreviews and presentssystematically the use of Internet in administration and politics. A process-oriented layer model defines the options of exchange and participation forall claim groups covering these topics: eAssistance, eProcurement, eService, eContracting, eSettlement, eCollaboration, eDemocracy, and eCommunity.Case studies show practical applications in industry, administration and research. The book is well suited for students in Business, Economicsand Political Sciences courses as well as for practitionersinterested in the opportunities of digital exchange and participation in the knowledge society. "

The UNESCO Memory of the World Programme - Key Aspects and Recent Developments (Hardcover, 1st ed. 2020): Ray Edmondson, Lothar... The UNESCO Memory of the World Programme - Key Aspects and Recent Developments (Hardcover, 1st ed. 2020)
Ray Edmondson, Lothar Jordan, Anca Claudia Prodan
R3,560 Discovery Miles 35 600 Ships in 10 - 15 working days

The volume "The UNESCO Memory of the World Programme: Key Aspects and Recent Developments" responds to the growing interest in the scientific study of the Memory of the World Programme (MoW) and its core concept of documentary heritage, which has received little attention from scholarship so far. This sixth publication in the Heritage Studies Series provides a first collection of differing approaches (including reflected reports, essays, research contributions, and theoretical reflections) for the study of the MoW Programme, offering a basis for follow-up activities. The volume, edited by Ray Edmondson, Lothar Jordan and Anca Claudia Prodan, brings together 21 scholars from around the globe to present aspects deemed crucial for understanding MoW, its development, relevance and potential. The aim is to encourage academic research on MoW and to enhance the understanding of its potential and place within Heritage Studies and beyond.

Frames and Connections in the Governance of Global Communications - A Network Study of the Internet Governance Forum... Frames and Connections in the Governance of Global Communications - A Network Study of the Internet Governance Forum (Hardcover)
Elena Pavan
R2,550 Discovery Miles 25 500 Ships in 12 - 17 working days

The governance of global communications is consolidating as a field where innovative political practices of multi-actor collaboration are being experimented. Within this broad political landscape, the Internet governance domain is emerging as one of the most relevant areas where institutional and non-institutional actors are converging in order to reform collectively governance mechanisms that will determine the future developments of the Internet technology. This book adopts a network approach to study the progressive and collective construction of a new discourse on Internet governance fostered by the realization of the United Nations Internet Governance Forum, a new "space for multi-stakeholder policy-dialogue" (WSIS Tunis Agenda 2005, art. 72). Looking both at how semantic and social connections are created in the online and the offline discursive spaces, this book seeks to provide insights on how principles of democratic collaboration between institutional and non-institutional actors are translated into actual political dynamics; on how the global political agenda on the governance of the Internet comes to be shaped thanks to the provision of heterogeneous and sometimes opposite thematic inputs; and, finally, on how the roles of States, intergovernmental bodies, civil society entities in participatory supra-national politics are progressively being (re)defined. Starting form the Internet governance case study, this books aims at providing an alternative approach to the study of supra-national politics as well as of global communication governance processes: one that considers simultaneously contents and processes of political dynamics and examines how immaterial resources, such as information and communication, become a new field for multi-actor politics experiments, conflicts and network construction.

Cybersecurity for Industry 4.0 - Analysis for Design and Manufacturing (Hardcover, 1st ed. 2017): Lane Thames, Dirk Schaefer Cybersecurity for Industry 4.0 - Analysis for Design and Manufacturing (Hardcover, 1st ed. 2017)
Lane Thames, Dirk Schaefer
R4,957 Discovery Miles 49 570 Ships in 12 - 17 working days

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity.

Blockchain and Distributed Ledger Technology Use Cases - Applications and Lessons Learned (Hardcover, 1st ed. 2020): Horst... Blockchain and Distributed Ledger Technology Use Cases - Applications and Lessons Learned (Hardcover, 1st ed. 2020)
Horst Treiblmaier, Trevor Clohessy
R5,237 Discovery Miles 52 370 Ships in 12 - 17 working days

Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications.

Augmented Reality and Virtual Reality - The Power of AR and VR for Business (Hardcover, 1st ed. 2019): M. Claudia Tom Dieck,... Augmented Reality and Virtual Reality - The Power of AR and VR for Business (Hardcover, 1st ed. 2019)
M. Claudia Tom Dieck, Timothy Jung
R4,595 Discovery Miles 45 950 Ships in 12 - 17 working days

This book presents a collection of the latest research in the area of immersive technologies, presented at the International Augmented and Virtual Reality Conference 2018 in Manchester, UK, and showcases how augmented reality (AR) and virtual reality (VR) are transforming the business landscape. Innovations in this field are seen as providing opportunities for businesses to offer their customers unique services and experiences. The papers gathered here advance the state of the art in AR/VR technologies and their applications in various industries such as healthcare, tourism, hospitality, events, fashion, entertainment, retail, education and gaming. The volume collects contributions by prominent computer and social sciences experts from around the globe. Addressing the most significant topics in the field of augmented and virtual reality and sharing the latest findings, it will be of interest to academics and practitioners alike.

Stochastic Networked Control Systems - Stabilization and Optimization under Information Constraints (Hardcover, 2013 ed.):... Stochastic Networked Control Systems - Stabilization and Optimization under Information Constraints (Hardcover, 2013 ed.)
Serdar Yuksel, Tamer Basar
R4,291 Discovery Miles 42 910 Ships in 12 - 17 working days

Networked control systems are increasingly ubiquitous today, with applications ranging from vehicle communication and adaptive power grids to space exploration and economics. The optimal design of such systems presents major challenges, requiring tools from various disciplines within applied mathematics such as decentralized control, stochastic control, information theory, and quantization.

A thorough, self-contained book, "Stochastic Networked Control Systems: Stabilization and Optimization under Information Constraints" aims to connect these diverse disciplines with precision and rigor, while conveying design guidelines to controller architects. Unique in the literature, it lays a comprehensive theoretical foundation for the study of networked control systems, and introduces an array of concrete tools for work in the field. Salient features included:

. Characterization, comparison and optimal design of information structures in static and dynamic teams. Operational, structural and topological properties of information structures in optimal decision making, with a systematic program for generating optimal encoding and control policies. The notion of signaling, and its utilization in stabilization and optimization of decentralized control systems.

. Presentation of mathematical methods for stochastic stability of networked control systems using random-time, state-dependent drift conditions and martingale methods.

. Characterization and study of information channels leading to various forms of stochastic stability such as stationarity, ergodicity, and quadratic stability; and connections with information and quantization theories. Analysis of various classes of centralized and decentralized control systems.

. Jointly optimal design of encoding and control policies over various information channels and under general optimization criteria, including a detailed coverage of linear-quadratic-Gaussian models.

. Decentralized agreement and dynamic optimization under information constraints.

This monograph is geared toward a broad audience of academic and industrial researchers interested in control theory, information theory, optimization, economics, and applied mathematics. It could likewise serve as a supplemental graduate text. The reader is expected to have some familiarity with linear systems, stochastic processes, and Markov chains, but the necessary background can also be acquired in part through the four appendices included at the end.

. Characterization, comparison and optimal design of information structures in static and dynamic teams. Operational, structural and topological properties of information structures in optimal decision making, with a systematic program for generating optimal encoding and control policies. The notion of signaling, and its utilization in stabilization and optimization of decentralized control systems.

. Presentation of mathematical methods for stochastic stability of networked control systems using random-time, state-dependent drift conditions and martingale methods.

. Characterization and study of information channels leading to various forms of stochastic stability such as stationarity, ergodicity, and quadratic stability; and connections with information and quantization theories. Analysis of various classes of centralized and decentralized control systems.

. Jointly optimal design of encoding and control policies over various information channels and under general optimization criteria, including a detailed coverage of linear-quadratic-Gaussian models.

. Decentralized agreement and dynamic optimization under information constraints.

This monograph is geared toward a broad audience of academic and industrial researchers interested in control theory, information theory, optimization, economics, and applied mathematics. It could likewise serve as a supplemental graduate text. The reader is expected to have some familiarity with linear systems, stochastic processes, and Markov chains, but the necessary background can also be acquired in part through the four appendices included at the end.

Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015): Sherali Zeadally,... Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015)
Sherali Zeadally, Mohamad Badra
R2,401 Discovery Miles 24 010 Ships in 12 - 17 working days

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Policy-Based Network Management - Solutions for the Next Generation (Hardcover, New): John Strassner Policy-Based Network Management - Solutions for the Next Generation (Hardcover, New)
John Strassner
R2,610 Discovery Miles 26 100 Ships in 12 - 17 working days

Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities.
Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes it approachable for those who really need to understand what it has to offer. The author, founder of the IETF Policy Framework working group, discusses system requirements, information models, and system components for Policy-Based Management. He also provide practitioners with a resource for developing and/or incorporating PBNM systems. As network systems become larger and more complex, creating policies for them has become a crucial step in the management of network systems, and this book is a welcome addition to this exciting approach.
* Presents a completely new approach to PBNM that unites the business, system, and implementation spheres.
* As the basis for examples and discussion, uses the DEN-ng information model, an easy-to-understand open standard tied closely to eTOM and NGOSS.
* Introduces the Ponder system, then examines Ponder extensions designed to enhance the structure of high-level policies and their application in a PBNM system.
* Filled with examples illustrating how policies are most effectively used in a PBNM system and what new directions PBNM is likely to take.

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R3,946 Discovery Miles 39 460 Ships in 12 - 17 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016): Eman El-Sheikh,... Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016)
Eman El-Sheikh, Alfred Zimmermann, Lakhmi C. Jain
R4,363 R3,360 Discovery Miles 33 600 Save R1,003 (23%) Ships in 12 - 17 working days

This book presents emerging trends in the evolution of service-oriented and enterprise architectures. New architectures and methods of both business and IT are integrating services to support mobility systems, Internet of Things, Ubiquitous Computing, collaborative and adaptive business processes, Big Data, and Cloud ecosystems. They inspire current and future digital strategies and create new opportunities for the digital transformation of next digital products and services. Services Oriented Architectures (SOA) and Enterprise Architectures (EA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implementing various standards, like Web Services, REST, and Microservices. Managing the adaptation and evolution of such systems presents a great challenge. Service-Oriented Architecture enables flexibility through loose coupling, both between the services themselves and between the IT organizations that manage them. Enterprises evolve continuously by transforming and extending their services, processes and information systems. Enterprise Architectures provide a holistic blueprint to help define the structure and operation of an organization with the goal of determining how an organization can most effectively achieve its objectives. The book proposes several approaches to address the challenges of the service-oriented evolution of digital enterprise and software architectures.

Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016): James J... Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016)
James J (Jong Hyuk) Park, Gangman Yi, Young-Sik Jeong, Hong Shen
R3,768 R3,329 Discovery Miles 33 290 Save R439 (12%) Ships in 12 - 17 working days

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Predictive Maintenance in Dynamic Systems - Advanced Methods, Decision Support Tools and Real-World Applications (Hardcover,... Predictive Maintenance in Dynamic Systems - Advanced Methods, Decision Support Tools and Real-World Applications (Hardcover, 1st ed. 2019)
Edwin Lughofer, Moamar Sayed-Mouchaweh
R4,301 Discovery Miles 43 010 Ships in 12 - 17 working days

This book provides a complete picture of several decision support tools for predictive maintenance. These include embedding early anomaly/fault detection, diagnosis and reasoning, remaining useful life prediction (fault prognostics), quality prediction and self-reaction, as well as optimization, control and self-healing techniques. It shows recent applications of these techniques within various types of industrial (production/utilities/equipment/plants/smart devices, etc.) systems addressing several challenges in Industry 4.0 and different tasks dealing with Big Data Streams, Internet of Things, specific infrastructures and tools, high system dynamics and non-stationary environments . Applications discussed include production and manufacturing systems, renewable energy production and management, maritime systems, power plants and turbines, conditioning systems, compressor valves, induction motors, flight simulators, railway infrastructures, mobile robots, cyber security and Internet of Things. The contributors go beyond state of the art by placing a specific focus on dynamic systems, where it is of utmost importance to update system and maintenance models on the fly to maintain their predictive power.

Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.): Jan-Frederik Kremer, Benedikt... Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.)
Jan-Frederik Kremer, Benedikt Muller
R4,027 Discovery Miles 40 270 Ships in 12 - 17 working days

Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice.

In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches.

Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."

Privacy and Security for Cloud Computing (Hardcover, 2013 ed.): Siani Pearson, George Yee Privacy and Security for Cloud Computing (Hardcover, 2013 ed.)
Siani Pearson, George Yee
R2,828 Discovery Miles 28 280 Ships in 10 - 15 working days

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal access to data in a cloud computing environment; discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems; reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud; proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties; investigates the applicability of existing controls for mitigating information security risks to cloud computing environments; describes risk management for cloud computing from an enterprise perspective.

Tools and Algorithms for the Construction and Analysis of Systems (Hardcover): Bernhard Steffen, Fabrice Kordon, Marieke Huisman Tools and Algorithms for the Construction and Analysis of Systems (Hardcover)
Bernhard Steffen, Fabrice Kordon, Marieke Huisman
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days
Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019): Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal,... Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019)
Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal, Raghvendra Kumar
R2,815 Discovery Miles 28 150 Ships in 10 - 15 working days

The book describes the emergence of big data technologies and the role of Spark in the entire big data stack. It compares Spark and Hadoop and identifies the shortcomings of Hadoop that have been overcome by Spark. The book mainly focuses on the in-depth architecture of Spark and our understanding of Spark RDDs and how RDD complements big data's immutable nature, and solves it with lazy evaluation, cacheable and type inference. It also addresses advanced topics in Spark, starting with the basics of Scala and the core Spark framework, and exploring Spark data frames, machine learning using Mllib, graph analytics using Graph X and real-time processing with Apache Kafka, AWS Kenisis, and Azure Event Hub. It then goes on to investigate Spark using PySpark and R. Focusing on the current big data stack, the book examines the interaction with current big data tools, with Spark being the core processing layer for all types of data. The book is intended for data engineers and scientists working on massive datasets and big data technologies in the cloud. In addition to industry professionals, it is helpful for aspiring data processing professionals and students working in big data processing and cloud computing environments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,212 R1,121 Discovery Miles 11 210
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,838 Discovery Miles 48 380
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,808 Discovery Miles 98 080
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760

 

Partners