0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (256)
  • R250 - R500 (864)
  • R500+ (13,656)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Amazon QuickSight User Guide (Hardcover): Documentation Team Amazon QuickSight User Guide (Hardcover)
Documentation Team
R2,753 Discovery Miles 27 530 Ships in 18 - 22 working days
Communicating with XML (Hardcover, 2011): Airi Salminen, Frank Tompa Communicating with XML (Hardcover, 2011)
Airi Salminen, Frank Tompa
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book provides extensive insight into the possibilities and challenges of XML in building new information management solutions in networked organizations. After a brief introduction to Web communication features and XML fundamentals, the book examines the benefits of adopting XML and illustrates various types of XML use: XML in document management; XML for data-centric and multimedia components; XML as a format for metadata, including metadata for the Semantic Web; and XML in support of data interchange between software applications and among organizations. The challenges of adopting XML in large-scale information management are also discussed. In addition, applications across a broad spectrum are examined and numerous case studies pertaining to the adoption of XML are presented. The book is particularly suitable for courses offered in Information Studies, Information Systems, or Information Technology. It also serves as an excellent practical guide for professionals in information management and provides important support material for courses in Computer Science and in Business.

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover): Sunita Vikrant Dhavale Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover)
Sunita Vikrant Dhavale
R5,453 Discovery Miles 54 530 Ships in 18 - 22 working days

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

Streaming Analytics - Concepts, architectures, platforms, use cases and applications (Hardcover): Pethuru Raj, Chellammal... Streaming Analytics - Concepts, architectures, platforms, use cases and applications (Hardcover)
Pethuru Raj, Chellammal Surianarayanan, Koteeswaran Seerangan, George Ghinea
R3,444 R3,108 Discovery Miles 31 080 Save R336 (10%) Ships in 18 - 22 working days

When digitized entities, connected devices and microservices interact purposefully, we end up with a massive amount of multi-structured streaming (real-time) data that is continuously generated by different sources at high speed. Streaming analytics allows the management, monitoring, and real-time analytics of live streaming data. The topic has grown in importance due to the emergence of online analytics and edge and IoT platforms. A real digital transformation is being achieved across industry verticals through meticulous data collection, cleansing and crunching in real time. Capturing and subjecting those value-adding events is considered to be the prime task for achieving trustworthy and timely insights. The authors articulate and accentuate the challenges widely associated with streaming data and analytics, describe data analytics algorithms and approaches, present edge and fog computing concepts and technologies and show how streaming analytics can be accomplished in edge device clouds. They also delineate several industry use cases across cloud system operations in transportation and cyber security and other business domains. The book will be of interest to ICTs industry and academic researchers, scientists and engineers as well as lecturers and advanced students in the fields of data science, cloud/fog/edge architecture, internet of things and artificial intelligence and related fields of applications. It will also be useful to cloud/edge/fog and IoT architects, analytics professionals, IT operations teams and site reliability engineers (SREs).

Handbook of Distributed Sensor Networks: Volume II (Hardcover): Marvin Heather Handbook of Distributed Sensor Networks: Volume II (Hardcover)
Marvin Heather
R3,163 R2,865 Discovery Miles 28 650 Save R298 (9%) Ships in 18 - 22 working days
Private Cloud Computing - Consolidation, Virtualization, and Service-Oriented Infrastructure (Paperback): Stephen R. Smoot, Nam... Private Cloud Computing - Consolidation, Virtualization, and Service-Oriented Infrastructure (Paperback)
Stephen R. Smoot, Nam K. Tan
R1,225 Discovery Miles 12 250 Ships in 10 - 15 working days

Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. "Private Cloud Computing "offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.
Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment modelProvides an overview of cloud security and cloud management from the server virtualization perspectivePresents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environmentOffers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation

Complex Networks (Hardcover, 2013 ed.): Ronaldo Menezes, Alexandre Evsukoff, Marta C. Gonzalez Complex Networks (Hardcover, 2013 ed.)
Ronaldo Menezes, Alexandre Evsukoff, Marta C. Gonzalez
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

In the last decade we have seen the emergence of a new inter-disciplinary field concentrating on the understanding large networks which are dynamic, large, open, and have a structure that borders order and randomness. The field of Complex Networks has helped us better understand many complex phenomena such as spread of decease, protein interaction, social relationships, to name but a few.

The field of Complex Networks has received a major boost caused by the widespread availability of huge network data resources in the last years. One of the most surprising findings is that real networks behave very distinct from traditional assumptions of network theory. Traditionally, real networks were supposed to have a majority of nodes of about the same number of connections around an average. This is typically modeled by random graphs. But modern network research could show that the majority of nodes of real networks is very low connected, and, by contrast, there exists some nodes of very extreme connectivity (hubs).

The current theories coupled with the availability of data makes the field of Complex Networks (sometimes called Network Sciences) one of the most promising interdisciplinary disciplines of today. This sample of works in this book gives as a taste of what is in the horizon such controlling the dynamics of a network and in the network, using social interactions to improve urban planning, ranking in music, and the understanding knowledge transfer in influence networks."

Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016): Eman El-Sheikh,... Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016)
Eman El-Sheikh, Alfred Zimmermann, Lakhmi C. Jain
R4,185 R3,384 Discovery Miles 33 840 Save R801 (19%) Ships in 10 - 15 working days

This book presents emerging trends in the evolution of service-oriented and enterprise architectures. New architectures and methods of both business and IT are integrating services to support mobility systems, Internet of Things, Ubiquitous Computing, collaborative and adaptive business processes, Big Data, and Cloud ecosystems. They inspire current and future digital strategies and create new opportunities for the digital transformation of next digital products and services. Services Oriented Architectures (SOA) and Enterprise Architectures (EA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implementing various standards, like Web Services, REST, and Microservices. Managing the adaptation and evolution of such systems presents a great challenge. Service-Oriented Architecture enables flexibility through loose coupling, both between the services themselves and between the IT organizations that manage them. Enterprises evolve continuously by transforming and extending their services, processes and information systems. Enterprise Architectures provide a holistic blueprint to help define the structure and operation of an organization with the goal of determining how an organization can most effectively achieve its objectives. The book proposes several approaches to address the challenges of the service-oriented evolution of digital enterprise and software architectures.

Network Simulation Experiments Manual (Paperback, 3rd edition): Emad Aboelela Network Simulation Experiments Manual (Paperback, 3rd edition)
Emad Aboelela
R701 Discovery Miles 7 010 Ships in 10 - 15 working days

Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work by utilizing a software tool that simulates the functions within a network. The tool provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance.

"The Network Simulation Experiments Manual" takes this instructional tool a step further and provides detailed experiments on core networking topologies for use in this simulation environment. Various scenarios are presented within each topology: Review questions, suggested readings, a lab report, and exercises accompanying each assignment. The manual also comes with directions for downloading the free and easy-to-install OPNET IT Guru Academic Edition software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. Prepared by Professor Emad Aboelela of the Taibah University, Saudi Arabia, the experiments in the manual are closely tied to the organization of "Computer Networks: A Systems Approach, Fifth Edition" and, when used together, serve as a complete tool for understanding how and why computer networks function as they do.
*Updated and expanded by aninstructor who has used OPNET simulation tools in his classroom for numerous demonstrations and real-world scenarios.
* Software download based on an award-winning product made by OPNET Technologies, Inc., whose software is used by thousands of commercial and government organizations worldwide, and by over 500 universities.
*Useful experimentation for professionals in the workplace who are interested in learningand demonstrating the capability of evaluating different commercial networking products, i.e., Cisco routers.
*Covers the core networking topologies and includes assignments on Switched LANs, Network Design, CSMA, RIP, TCP, Queuing Disciplines, Web Caching, etc."

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,891 Discovery Miles 48 910 Ships in 18 - 22 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Cyber Attacks - Protecting National Infrastructure (Hardcover): Edward Amoroso Cyber Attacks - Protecting National Infrastructure (Hardcover)
Edward Amoroso
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Managing Big Data in Cloud Computing Environments (Hardcover): Zongmin Ma Managing Big Data in Cloud Computing Environments (Hardcover)
Zongmin Ma
R4,932 Discovery Miles 49 320 Ships in 18 - 22 working days

Cloud computing has proven to be a successful paradigm of service-oriented computing, and has revolutionized the way computing infrastructures are abstracted and used. By means of cloud computing technology, massive data can be managed effectively and efficiently to support various aspects of problem solving and decision making. Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud. Providing timely, research-based information relating to data storage, sharing, extraction, and indexing in cloud systems, this publication is an ideal reference source for graduate students, IT specialists, researchers, and professionals working in the areas of data and knowledge engineering.

Smart Buildings Digitalization, Two Volume Set (Hardcover): O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban Smart Buildings Digitalization, Two Volume Set (Hardcover)
O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban
R8,953 Discovery Miles 89 530 Ships in 10 - 15 working days

A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R4,027 R3,496 Discovery Miles 34 960 Save R531 (13%) Ships in 10 - 15 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests.

"Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."

Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015): George S. Oreku, Tamara Pazynyuk Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015)
George S. Oreku, Tamara Pazynyuk
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

The UNESCO Memory of the World Programme - Key Aspects and Recent Developments (Hardcover, 1st ed. 2020): Ray Edmondson, Lothar... The UNESCO Memory of the World Programme - Key Aspects and Recent Developments (Hardcover, 1st ed. 2020)
Ray Edmondson, Lothar Jordan, Anca Claudia Prodan
R3,380 Discovery Miles 33 800 Ships in 18 - 22 working days

The volume "The UNESCO Memory of the World Programme: Key Aspects and Recent Developments" responds to the growing interest in the scientific study of the Memory of the World Programme (MoW) and its core concept of documentary heritage, which has received little attention from scholarship so far. This sixth publication in the Heritage Studies Series provides a first collection of differing approaches (including reflected reports, essays, research contributions, and theoretical reflections) for the study of the MoW Programme, offering a basis for follow-up activities. The volume, edited by Ray Edmondson, Lothar Jordan and Anca Claudia Prodan, brings together 21 scholars from around the globe to present aspects deemed crucial for understanding MoW, its development, relevance and potential. The aim is to encourage academic research on MoW and to enhance the understanding of its potential and place within Heritage Studies and beyond.

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,396 Discovery Miles 13 960 Ships in 10 - 15 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

Computational Aspects and Applications in Large-Scale Networks - NET 2017, Nizhny Novgorod, Russia, June 2017 (Hardcover, 1st... Computational Aspects and Applications in Large-Scale Networks - NET 2017, Nizhny Novgorod, Russia, June 2017 (Hardcover, 1st ed. 2018)
Valery A. Kalyagin, Panos M. Pardalos, Oleg Prokopyev, Irina Utkina
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.

Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.): Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez,... Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.)
Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez, William B. Lober, Mark Thurmond
R5,434 Discovery Miles 54 340 Ships in 18 - 22 working days

This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.

Fiber Network Service Survivability (Hardcover): Tsong-Ho Wu Fiber Network Service Survivability (Hardcover)
Tsong-Ho Wu
R3,169 Discovery Miles 31 690 Ships in 18 - 22 working days

This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.

Beyond the Internet of Things - Everything Interconnected (Hardcover, 1st ed. 2017): Jordi Mongay Batalla, George Mastorakis,... Beyond the Internet of Things - Everything Interconnected (Hardcover, 1st ed. 2017)
Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R4,821 Discovery Miles 48 210 Ships in 10 - 15 working days

The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.

Frames and Connections in the Governance of Global Communications - A Network Study of the Internet Governance Forum... Frames and Connections in the Governance of Global Communications - A Network Study of the Internet Governance Forum (Hardcover)
Elena Pavan
R3,343 Discovery Miles 33 430 Ships in 10 - 15 working days

The governance of global communications is consolidating as a field where innovative political practices of multi-actor collaboration are being experimented. Within this broad political landscape, the Internet governance domain is emerging as one of the most relevant areas where institutional and non-institutional actors are converging in order to reform collectively governance mechanisms that will determine the future developments of the Internet technology. This book adopts a network approach to study the progressive and collective construction of a new discourse on Internet governance fostered by the realization of the United Nations Internet Governance Forum, a new "space for multi-stakeholder policy-dialogue" (WSIS Tunis Agenda 2005, art. 72). Looking both at how semantic and social connections are created in the online and the offline discursive spaces, this book seeks to provide insights on how principles of democratic collaboration between institutional and non-institutional actors are translated into actual political dynamics; on how the global political agenda on the governance of the Internet comes to be shaped thanks to the provision of heterogeneous and sometimes opposite thematic inputs; and, finally, on how the roles of States, intergovernmental bodies, civil society entities in participatory supra-national politics are progressively being (re)defined. Starting form the Internet governance case study, this books aims at providing an alternative approach to the study of supra-national politics as well as of global communication governance processes: one that considers simultaneously contents and processes of political dynamics and examines how immaterial resources, such as information and communication, become a new field for multi-actor politics experiments, conflicts and network construction.

Interconnecting Smart Objects with IP - The Next Internet (Paperback): Jean-Philippe Vasseur, Adam Dunkels Interconnecting Smart Objects with IP - The Next Internet (Paperback)
Jean-Philippe Vasseur, Adam Dunkels
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. "Interconnecting Smart Objects with IP" is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless sensor networks, ubiquitous and pervasive computing, mobile telephony and telemetry, and mobile computer networking. This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, and protocols for smart objects, and Part III provides case studies on how and where smart objects are being used today and in the future. The book covers the fundamentals of IP communication for smart objects, IPv6, and web services, as well as several newly specified low-power IP standards such as the IETF 6LoWPAN adaptation layer and the RPL routing protocol. This book contains essential information not only for the technical reader but also for policy makers and decision makers in the area of smart objects both for private IP networks and the Internet.
Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services

Chipless RFID - Design Procedure and Detection Techniques (Hardcover, 2015 ed.): Reza Rezaiesarlak, Majid Manteghi Chipless RFID - Design Procedure and Detection Techniques (Hardcover, 2015 ed.)
Reza Rezaiesarlak, Majid Manteghi
R3,812 R3,282 Discovery Miles 32 820 Save R530 (14%) Ships in 10 - 15 working days

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers chipless RFID components in block diagram representation and introduce FCC requirements which should be considered in the design procedure of each component. The third chapter is dedicated to the complex natural resonance-based design of chipless RFID tags. The next chapter concerns about the detection techniques introduced for the identification of chipless RFID tags. The fifth chapter is dedicated to the localization and anti-collision techniques in chipless RFID systems. Final chapter is chipless RFID tags as sensors. It provides some applications where the tag can be used as both ID and sensor. The tag specifications and detection issues are addressed in this section.

Social Customer Relationship Management - Fundamentals, Applications, Technologies (Hardcover, 1st ed. 2020): Rainer Alt, Olaf... Social Customer Relationship Management - Fundamentals, Applications, Technologies (Hardcover, 1st ed. 2020)
Rainer Alt, Olaf Reinhold
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Social media has received considerable attention, and many potential benefits, as well as concerns, are now being discussed. This book explores how social media can successfully support business processes in marketing, sales and service in the context of customer relationship management (CRM). It presents the fundamentals of Social CRM and shows how small and large companies alike have implemented it. In turn, the book presents analytic and operational software tools that offer features for enhancing and streamlining interactions with customers. The book concludes with an overview of essential design areas that businesses need to bear in mind when introducing social media into their CRM strategies. In this regard, it also points out key success factors, limitations, and data protection aspects.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710

 

Partners