0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (322)
  • R250 - R500 (922)
  • R500+ (16,341)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Shaping the Future of ICT - Trends in Information Technology, Communications Engineering, and Management (Paperback): Ibrahiem... Shaping the Future of ICT - Trends in Information Technology, Communications Engineering, and Management (Paperback)
Ibrahiem M.M.El Emary, Anna Brzozowska
R1,483 Discovery Miles 14 830 Ships in 12 - 17 working days

The International Conference on Communications, Management, and Information Technology (ICCMIT'16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on nature, using computational intelligence methodologies, as well as in emerging areas related to the three tracks of the conference: Communication Engineering, Knowledge, and Information Technology. The best 25 papers to be included in the book will be carefully reviewed and selected from numerous submissions, then revised and expanded to provide deeper insight into trends shaping future ICT.

Device-to-Device based Proximity Service - Architecture, Issues, and Applications (Paperback): Yufeng Wang, Athanasios V... Device-to-Device based Proximity Service - Architecture, Issues, and Applications (Paperback)
Yufeng Wang, Athanasios V Vasilakos, Qun Jin, Hongbo Zhu
R1,480 Discovery Miles 14 800 Ships in 12 - 17 working days

D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.

Energy-Efficient Wireless Sensor Networks (Paperback): Vidushi Sharma, Anuradha Pughat Energy-Efficient Wireless Sensor Networks (Paperback)
Vidushi Sharma, Anuradha Pughat
R1,450 Discovery Miles 14 500 Ships in 12 - 17 working days

The advances in low-power electronic devices integrated with wireless communication capabilities are one of recent areas of research in the field of Wireless Sensor Networks (WSNs). One of the major challenges in WSNs is uniform and least energy dissipation while increasing the lifetime of the network. This is the first book that introduces the energy efficient wireless sensor network techniques and protocols. The text covers the theoretical as well as the practical requirements to conduct and trigger new experiments and project ideas. The advanced techniques will help in industrial problem solving for energy-hungry wireless sensor network applications.

An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Paperback): Nikos Daskalakis, Panagiotis Georgitseas An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Paperback)
Nikos Daskalakis, Panagiotis Georgitseas
R1,209 Discovery Miles 12 090 Ships in 12 - 17 working days

The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.

Systems Approach to the Design of Commercial Aircraft (Hardcover): Scott Jackson, Ricardo Moraes dos Santos Systems Approach to the Design of Commercial Aircraft (Hardcover)
Scott Jackson, Ricardo Moraes dos Santos
R2,549 Discovery Miles 25 490 Ships in 12 - 17 working days

While aviation fatalities have thankfully fallen dramatically in recent years, the phenomena of complexity and cognitive bias have been shown to be factors in many accidents. An understanding of these phenomena promises to bring the fatality rate even lower, and a deeper understanding of commercial aircraft in the context of systems engineering will contribute to that trend. Systems Approach to the Design of Commercial Aircraft describes commercial aircraft from an advanced systems point of view, addressing complexity, cybersecurity, and systems architecting. In addition, it provides an explanation of systems engineering, describes how systems engineering forms a framework for commercial aircraft, covers how systems engineering and systems architecting relate to commercial aircraft, addresses complexity, and shows how humans fit into systems engineering and the importance for commercial aircraft. It goes onto present how cybersecurity plays an important role in the mix and how human interface fits in. The readership includes designers of aircraft, manufacturers, researchers, systems engineers, and students. Scott Jackson is a fellow of the International Council on Systems Engineering (INCOSE) and the author of Systems Engineering for Commercial Aircraft (1997 and 2015) in English and Chinese. Ricardo Moraes dos Santos is a senior systems engineer at EMBRAER S/A and an INCOSE Brazil chapter director. He works with Architecting process (Corporate) and is head of Cybersecurity and Safety (STPA Applications) at EMBRAER S/A.

Hey Cyba - The Inner Workings of a Virtual Personal Assistant (Paperback): Steve Young Hey Cyba - The Inner Workings of a Virtual Personal Assistant (Paperback)
Steve Young
R588 Discovery Miles 5 880 Ships in 12 - 17 working days

Recent developments in artificial intelligence, especially neural network and deep learning technology, have led to rapidly improving performance in voice assistants such as Siri and Alexa. Over the next few years, capability will continue to improve and become increasingly personalised. Today's voice assistants will evolve into virtual personal assistants firmly embedded within our everyday lives. Told through the view of a fictitious personal assistant called Cyba, this book provides an accessible but detailed overview of how a conversational voice assistant works, especially how it understands spoken language, manages conversations, answers questions and generates responses. Cyba explains through examples and diagrams the neural network technology underlying speech recognition and synthesis, natural language understanding, knowledge representation, conversation management, language translation and chatbot technology. Cyba also explores the implications of this rapidly evolving technology for security, privacy and bias, and gives a glimpse of future developments. Cyba's website can be found at HeyCyba.com.

Cybersecurity for Information Professionals - Concepts and Applications (Hardcover): Hsia-Ching Chang, Suliman Hawamdeh Cybersecurity for Information Professionals - Concepts and Applications (Hardcover)
Hsia-Ching Chang, Suliman Hawamdeh
R2,186 Discovery Miles 21 860 Ships in 12 - 17 working days

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.

Networks of the Future - Architectures, Technologies, and Implementations (Paperback): Mahmoud Elkhodr, Qusay F. Hassan, Seyed... Networks of the Future - Architectures, Technologies, and Implementations (Paperback)
Mahmoud Elkhodr, Qusay F. Hassan, Seyed Shahrestani
R1,691 Discovery Miles 16 910 Ships in 12 - 17 working days

With the ubiquitous diffusion of the IoT, Cloud Computing, 5G and other evolved wireless technologies into our daily lives, the world will see the Internet of the future expand ever more quickly. Driving the progress of communications and connectivity are mobile and wireless technologies, including traditional WLANs technologies and low, ultra-power, short and long-range technologies. These technologies facilitate the communication among the growing number of connected devices, leading to the generation of huge volumes of data. Processing and analysis of such "big data" brings about many opportunities, as well as many challenges, such as those relating to efficient power consumptions, security, privacy, management, and quality of service. This book is about the technologies, opportunities and challenges that can drive and shape the networks of the future. Written by established international researchers and experts, Networks of the Future answers fundamental and pressing research challenges in the field, including architectural shifts, concepts, mitigation solutions and techniques, and key technologies in the areas of networking. The book starts with a discussion on Cognitive Radio (CR) technologies as promising solutions for improving spectrum utilization, and also highlights the advances in CR spectrum sensing techniques and resource management methods. The second part of the book presents the latest developments and research in the areas of 5G technologies and Software Defined Networks (SDN). Solutions to the most pressing challenges facing the adoption of 5G technologies are also covered, and the new paradigm known as Fog Computing is examined in the context of 5G networks. The focus next shifts to efficient solutions for future heterogeneous networks. It consists of a collection of chapters that discuss self-healing solutions, dealing with Network Virtualization, QoS in heterogeneous networks, and energy efficient techniques for Passive Optical Networks and Wireless Sensor Networks. Finally, the areas of IoT and Big Data are discussed, including the latest developments and future perspectives of Big Data and the IoT paradigms.

Communication, Management and Information Technology - International Conference on Communciation, Management and Information... Communication, Management and Information Technology - International Conference on Communciation, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016) (Hardcover)
Marcelo Sampaio De Alencar
R7,816 Discovery Miles 78 160 Ships in 9 - 15 working days

Communication, Management and Information Technology contains the contributions presented at the International Conference on Communication, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016, organized by the Universal Society of Applied Research (USAR). The book aims at researchers, scientists, engineers, and scholar students interested or involved in Computer Science and Systems, Communication, and Management.

Computer Network Simulation Using NS2 (Paperback): Ajit Kumar Nayak, Satyananda Champati Rai, Rajib Mall Computer Network Simulation Using NS2 (Paperback)
Ajit Kumar Nayak, Satyananda Champati Rai, Rajib Mall
R1,484 Discovery Miles 14 840 Ships in 12 - 17 working days

Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge and skills, covering everything from simple operating system commands to the analysis of complex network performance metrics. The book begins with a discussion of the evolution of data communication techniques and the fundamental issues associated with performance evaluation. After presenting a preliminary overview of simulation and other performance evaluation techniques, the authors: Describe a number of computer network protocols and TCP/IP and OSI models, highlighting the networking devices used Explain a socket and its use in network programming, fostering the development of network applications using C and socket API Introduce the NS2 network simulator, exhibiting its internal architecture, constituent software packages, and installation in different operating systems Delve into simulation using NS2, elaborating on the use of Tcl and OTcl scripts as well as AWK scripting and plotting with Gnuplot Show how to simulate wired and wireless network protocols step by step, layer by layer Explore the idea of simulating very large networks, identifying the challenges associated with measuring and graphing the various network parameters Include nearly 90 example programs, scripts, and outputs, along with several exercises requiring application of the theory and programming Computer Network Simulations Using NS2 emphasizes the implementation and simulation of real-world computer network protocols, affording readers with valuable opportunities for hands-on practice while instilling a deeper understanding of how computer network protocols work.

Internet Infrastructure - Networking, Web Services, and Cloud Computing (Paperback): Richard Fox, Wei Hao Internet Infrastructure - Networking, Web Services, and Cloud Computing (Paperback)
Richard Fox, Wei Hao
R1,559 Discovery Miles 15 590 Ships in 12 - 17 working days

Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses. The material in the text is divided into concept chapters that are followed up with case study chapters that examine how to install, configure, and secure a server that offers the given service discussed. The book covers in detail the Bind DNS name server, the Apache web server, and the Squid proxy server. It also provides background on those servers by discussing DNS, DHCP, HTTP, HTTPS, digital certificates and encryption, web caches, and the variety of protocols that support web caching. Introductory networking content, as well as advanced Internet content, is also included in chapters on networks, LANs and WANs, TCP/IP, TCP/IP tools, cloud computing, and an examination of the Amazon Cloud Service. Online resources include supplementary content that is available via the textbook's companion website, as well useful resources for faculty and students alike, including: a complete lab manual; power point notes, for installing, configuring, securing and experimenting with many of the servers discussed in the text; power point notes; animation tutorials to illustrate some of the concepts; two appendices; and complete input/output listings for the example Amazon cloud operations covered in the book.

Statistical Methods in Computer Security (Paperback): William W.S. Chen Statistical Methods in Computer Security (Paperback)
William W.S. Chen
R1,491 Discovery Miles 14 910 Ships in 12 - 17 working days

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.

Telegeoinformatics - Location-Based Computing and Services (Paperback): Hassan A. Karimi Telegeoinformatics - Location-Based Computing and Services (Paperback)
Hassan A. Karimi
R1,494 Discovery Miles 14 940 Ships in 12 - 17 working days

This book explains the fundamentals and intricacies of telegeoinformatics. The book is divided into three parts: Theories and Technologies; Integrated Data and Technologies; and Applications. These sections are divided into smaller contributed chapters, each of which addresses a topic crucial to the understanding of telegeoinformatics. This volume covers the concepts and technologies related to GIS and geoprocessing, remote sensing, the GPS, and wireless systems. It also explores the main issues of integrated data and technologies in LBC, LBS, mediated reality, and mobile augmented reality systems. The final part discusses applications of telegeoinformatics in emergency response, mobile inspection data collection, and ITS.

Building an Event-Driven Data Mesh - Patterns for Designing & Building Event-Driven Architectures (Paperback): Adam Bellemare Building an Event-Driven Data Mesh - Patterns for Designing & Building Event-Driven Architectures (Paperback)
Adam Bellemare
R1,278 R1,120 Discovery Miles 11 200 Save R158 (12%) Ships in 12 - 17 working days

The exponential growth of data combined with the need to derive real-time business value is a critical issue today. An event-driven data mesh can power real-time operational and analytical workloads, all from a single set of data product streams. With practical real-world examples, this book shows you how to successfully design and build an event-driven data mesh. Building an Event-Driven Data Mesh provides: Practical tips for iteratively building your own event-driven data mesh, including hurdles you'll experience, possible solutions, and how to obtain real value as soon as possible Solutions to pitfalls you may encounter when moving your organization from monoliths to event-driven architectures A clear understanding of how events relate to systems and other events in the same stream and across streams A realistic look at event modeling options, such as fact, delta, and command type events, including how these choices will impact your data products Best practices for handling events at scale, privacy, and regulatory compliance Advice on asynchronous communication and handling eventual consistency

Security and Privacy Vision in 6G - A Comprehensive Guide (Hardcover): Pawani Porambage, Madhusanka Liyanage Security and Privacy Vision in 6G - A Comprehensive Guide (Hardcover)
Pawani Porambage, Madhusanka Liyanage
R2,946 Discovery Miles 29 460 Ships in 12 - 17 working days

SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication with this comprehensive study 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. Security and Privacy Vision in 6G provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. Security and Privacy Vision in 6G readers will also find: Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more Treatment balancing the practical and the theoretical An editorial team with decades of international network technology experience in both industry and academia Security and Privacy Vision in 6G is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.

System Design Interview - An insider's guide (Paperback): Alex Xu System Design Interview - An insider's guide (Paperback)
Alex Xu
R1,000 Discovery Miles 10 000 Ships in 10 - 15 working days
CompTIA Network+ Study Guide: Exam N10-008 5e (Paperback, 5th Edition): T Lammle CompTIA Network+ Study Guide: Exam N10-008 5e (Paperback, 5th Edition)
T Lammle
R1,113 Discovery Miles 11 130 Ships in 12 - 17 working days

Prepare for the Network+ certification and a new career in network installation and administration In the newly revised Fifth Edition of CompTIA Network+ Study Guide Exam N10-008, bestselling author and network expert Todd Lammle delivers thorough coverage of how to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. This book will prepare you to succeed on the sought-after CompTIA Network+ certification exam, impress interviewers in the network industry, and excel in your first role as a junior network administrator, support technician, or related position. The accomplished author draws on his 30 years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam N10-008: Networking fundamentals, implementations, operations, security, and troubleshooting. You'll also get: Complete, domain-specific coverage of the updated Network+ Exam N10-008 Preparation to obtain a leading network certification enjoyed by over 350,000 networking professionals Access to a superior set of online study tools, including practice exams, flashcards, and glossary of key terms. Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam N10-008, the Fifth Edition of CompTIA Network+ Study Guide Exam N10-008 is a must-have resource for network administrators seeking to enhance their skillset with foundational skills endorsed by industry and thought leaders from around the world.

Cybersecurity Fundamentals - A Real-World Perspective (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Cybersecurity Fundamentals - A Real-World Perspective (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R5,800 Discovery Miles 58 000 Ships in 12 - 17 working days

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

Modern System Administration - Managing Reliable and Sustainable Systems (Paperback): Jennifer Davis Modern System Administration - Managing Reliable and Sustainable Systems (Paperback)
Jennifer Davis
R1,281 R1,123 Discovery Miles 11 230 Save R158 (12%) Ships in 12 - 17 working days

Early system administration required in-depth knowledge of a variety of services on individual systems. Now, the job is increasingly complex and different from one company to the next with an ever-growing list of technologies and third-party services to integrate. How does any one individual stay relevant in systems and services? This practical guide helps anyone in operations -sysadmins, automation engineers, IT professionals, and site reliability engineers - understand the essential concepts of the role today. Collaboration, automation, and the evolution of systems change the fundamentals of operations work. No matter where you are in your journey, this book provides you the information to craft your path to advancing essential system administration skills. Author Jennifer Davis provides examples of modern practices and tools with recommended materials to advance your skills. Topics include: Development and testing: Version control, fundamentals of virtualization and containers, testing, and architecture review Deploying and configuring services: Infrastructure management, networks, security, storage, serverless, and release management Scaling administration: Monitoring and observability, capacity planning, log management and analysis, and security and compliance

Digital Economy for Customer Benefit and Business Fairness - Proceedings of the International Conference on Sustainable... Digital Economy for Customer Benefit and Business Fairness - Proceedings of the International Conference on Sustainable Collaboration in Business, Information and Innovation (SCBTII 2019), Bandung, Indonesia, October 9-10, 2019 (Hardcover)
Grisna Anggadwita, Erni Martini
R7,281 Discovery Miles 72 810 Ships in 12 - 17 working days

The international conference "Sustainable Collaboration in Business, Technology, Information and Innovation (SCBTII) 2019" has brought together academics, professionals, entrepreneurs, researchers, learners, and other related groups from around the world who have a special interest in theories and practices in the development of the field of digital economy for global competitiveness. Considering that, at present, technology and industry 4.0 are still a leading trend and offer great opportunities for global businesses, the rise of industry 4.0 makes competition in the business world more attractive, yet fierce. Opportunities and challenges for business development in industry 4.0 are becoming firm and it also provides businesses the possibility to compete globally. Companies that desire to enter this global competition should pay attention to customer benefits and business fairness in order to achieve sustainability in this digital economy. This proceedings volume contains selected papers from this conference and presents opportunities to communicate and exchange new ideas and experiences. Moreover, the conference provided opportunities, both for the presenters and the participants, to establish research relations, and find global partners for future collaboration.

Cybersecurity For Dummies (Paperback): J. Steinberg Cybersecurity For Dummies (Paperback)
J. Steinberg
R639 R485 Discovery Miles 4 850 Save R154 (24%) Out of stock

Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being cyber-secure means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.

Blockchain for Medical Research - Accelerating Trust in Healthcare (Paperback): Yael Bizouati-Kennedy, Sean Manion Blockchain for Medical Research - Accelerating Trust in Healthcare (Paperback)
Yael Bizouati-Kennedy, Sean Manion
R1,282 Discovery Miles 12 820 Ships in 12 - 17 working days

It takes 17 years on average to bring new medical treatments ideas into evidence-based clinical practice. The growing replicability crisis in science further delays these "new miracles." Blockchain can improve science and accelerate medical research while bringing a new layer of trust to healthcare. This book is about science, its value to medicine, and how we can use blockchain to improve the quality and impact of both. The book looks at science and medicine from an insider's perspective and describes the processes, successes, shortcomings and opportunities in an accessible way for a broad audience. It weaves this a non-technical look at the emerging world of blockchain technology; what it is, where it is useful, and how it can improve science and medicine. It lays out a roadmap for this application to transform how we develop knowledge about health and medicine to improve our lives. In the first part, Blockchain isn't Tech, the authors look at blockchain/distributed ledger technology along with critical trade-offs and current explorations of its utility. They give an overview of use cases for the technology across industries, including finance, manufacturing and healthcare, with interviews and insights from leaders across government, academia, and tech/health industry both big and start-up. In the second part, Science is Easy, the authors look at science as a process and how this drives advancement in medicine. They shed a light on some of science's shortcomings, including the reproducibility crisis and problems with misaligned incentives (i.e. publish or perish). They apply a breakdown of critical components to the functional steps in the scientific process and outline how the open science movement is looking to improve these, while highlighting the limit of these fixes with current technology, incentives and structure of science. In the third part, DAO of Science, the authors look at how blockchain applied to open science can impact medical research. They examine how this distributed approach can provide better quality science, value-based research and faster medical miracles. Finally, they provide a vision of the future of distributed medical research and give a roadmap of steps to get there.

Internet of Nano-Things and Wireless Body Area Networks (WBAN) (Paperback): Fadi Al-Turjman Internet of Nano-Things and Wireless Body Area Networks (WBAN) (Paperback)
Fadi Al-Turjman
R1,436 Discovery Miles 14 360 Ships in 12 - 17 working days

The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The book addresses data routing and energy consumption challenges and proposes nano-sensing platforms in critical Wireless Body Area Networks (WBAN). This book covers both design and implementation aspects of data delivery models and strategies in a smart application enabled by the WBAN. It focuses on smart data delivery approaches and energy savings aspects in a reliable IoNT systems.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Hardcover): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Hardcover)
Waymond Rodgers
R5,035 Discovery Miles 50 350 Ships in 12 - 17 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Pathways to data communication and networking: Fet level 4: Textbook (Paperback): Pathways to data communication and networking: Fet level 4: Textbook (Paperback)
R500 R441 Discovery Miles 4 410 Save R59 (12%) Ships in 5 - 10 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,271 Discovery Miles 12 710
(ISC)(2) CISSP Certified Information…
M. Chapple Paperback R1,370 Discovery Miles 13 700
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430
Introduction to Networking Basics
Patrick Ciccarelli, Christina Faulkner, … Paperback R2,320 R387 Discovery Miles 3 870
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Quantum Computing For Dummies
William Hurley, Floyd Earl Smith Paperback R567 Discovery Miles 5 670
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560

 

Partners