0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,566)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Software Defined Networks - A Comprehensive Approach (Paperback): Paul Goransson, Chuck Black Software Defined Networks - A Comprehensive Approach (Paperback)
Paul Goransson, Chuck Black
R1,041 Discovery Miles 10 410 Ships in 10 - 15 working days

"Software Defined Networks" discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN modelHow to make intelligent decisions about when to integrate SDN technologies in a networkHow to decide if your organization should be developing its own SDN applications or looking to acquire these from an outside vendorHow to accelerate the ability to develop your own SDN application, be it entirely novel or a more efficient approach to a long-standing problem
Discusses the evolution of the switch platforms that enable SDN Addresses when to integrate SDN technologies in a networkProvides an overview of sample SDN applications relevant to different industriesIncludes practical examples of how to write SDN applications

Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.): Joyce... Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.)
Joyce Westerink, Martin Ouwerkerk, Therese J. M. Overbeek, W. Frank Pasveer
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

This book adheres to the vision that in the future compelling user experiences will be key differentiating benefits of products and services. Evaluating the user experience plays a central role, not only during the design process, but also during regular usage: for instance a video recorder that recommends TV programs that fit your current mood, a product that measures your current level of relaxation and produces advice on how to balance your life, or a module that alerts a factory operator when he is getting drowsy. Such systems are required to assess and interpret user experiences (almost) in real-time, and that is exactly what this book is about. How to achieve this? What are potential applications of psychophysiological measurements? Are real-time assessments based on monitoring of user behavior possible? If so, which elements are critical? Are behavioral aspects important? Which technology can be used? How important are intra-individual differences? What can we learn from products already on the market? The book gathers a group of invited authors from different backgrounds, such as technology, academy and business. This is a mosaic of their work, and that of Philips Research, in the assessment of user experience, covering the full range from academic research to commercial propositions..

Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover): Francesca... Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover)
Francesca Comunello
R4,467 Discovery Miles 44 670 Ships in 18 - 22 working days

The recent popularity of Social Network Sites (SNS) shows that there is a growing interest in articulating, making visible, and managing personal or professional relationships through technology-enabled environments. Networked Sociability and Individualism: Technology for Personal and Professional Relationships provides a multidisciplinary framework for analyzing the new forms of sociability enabled by digital media and networks. This book focuses on a variety of social media and computer-mediated communication environments with the aim of identifying and understanding different types of social behavior and identity expression.

Handbook of Computer Networks and Communications: Volume I (Hardcover): Akira Hanako Handbook of Computer Networks and Communications: Volume I (Hardcover)
Akira Hanako
R3,160 R2,862 Discovery Miles 28 620 Save R298 (9%) Ships in 18 - 22 working days
Elastic Load Balancing Classic Load Balancers (Hardcover): Documentation Team Elastic Load Balancing Classic Load Balancers (Hardcover)
Documentation Team
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days
Information Assurance - Dependability and Security in Networked Systems (Hardcover): Yi Qian, David Tipper, Prashant... Information Assurance - Dependability and Security in Networked Systems (Hardcover)
Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
KEY FEATURES
* The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting
* Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance
* Additional focus on security and survivability issues in wireless networks

Wireless Communications & Networking (Hardcover): Vijay Garg Wireless Communications & Networking (Hardcover)
Vijay Garg
R2,209 Discovery Miles 22 090 Ships in 10 - 15 working days

This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN).
The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.)
After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems.
A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts.
Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students.
*Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN)
*Comprehensive and up-to-date coverage including the latest in standards and 4G technology
*Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available

Digital Watermarking and Steganography (Hardcover, 2nd edition): Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich,... Digital Watermarking and Steganography (Hardcover, 2nd edition)
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications

Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover): Information Resources Management... Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover)
Information Resources Management Association
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

The internet has grown to become one of the largest communication hubs in history. With its ability to share content and create community bonds, it has seen many fandoms and online social communities develop within the past decades. While there are some detriments to these communities, there are also many benefits and potential uses for the betterment of society. The Research Anthology on Fandoms, Online Social Communities, and Pop Culture explores the ways in which the internet has presented itself as a platform for communities to gather. This essential reference source discusses the engagement of these communities, social media use, and the uses of these communities for education. Covering topics such as digital communities, transmedia language learning, and digital humanities, this book is a vital tool for educators of K-12 and higher education, digital folklorists, sociologists, communications researchers, online administrators, community leaders, and academicians.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R7,802 Discovery Miles 78 020 Ships in 18 - 22 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R7,808 Discovery Miles 78 080 Ships in 18 - 22 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Content Delivery Networks (Hardcover, 2008 ed.): Rajkumar Buyya, Mukaddim Pathan, Athena Vakali Content Delivery Networks (Hardcover, 2008 ed.)
Rajkumar Buyya, Mukaddim Pathan, Athena Vakali
R5,888 Discovery Miles 58 880 Ships in 18 - 22 working days

"Content Delivery Networks" enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.

Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.): Shafiullah Khan, Al-Sakib Khan... Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.)
Shafiullah Khan, Al-Sakib Khan Pathan
R6,061 R4,929 Discovery Miles 49 290 Save R1,132 (19%) Ships in 10 - 15 working days

"Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.

Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS... Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS 2009, Langenargen, Germany, September 14-16, 2009, Proceedings (Hardcover, 2009 ed.)
Achim Rettberg, Mauro C. Zanella, Michael Amann, Michael Keckeisen, Franz J. Rammig
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This book presents the technical program of the International Embedded Systems Symposium (IESS) 2009. Timely topics, techniques and trends in embedded system design are covered by the chapters in this volume, including modelling, simulation, verification, test, scheduling, platforms and processors. Particular emphasis is paid to automotive systems and wireless sensor networks. Sets of actual case studies in the area of embedded system design are also included. Over recent years, embedded systems have gained an enormous amount of proce- ing power and functionality and now enter numerous application areas, due to the fact that many of the formerly external components can now be integrated into a single System-on-Chip. This tendency has resulted in a dramatic reduction in the size and cost of embedded systems. As a unique technology, the design of embedded systems is an essential element of many innovations. Embedded systems meet their performance goals, including real-time constraints, through a combination of special-purpose hardware and software components tailored to the system requirements. Both the development of new features and the reuse of existing intellectual property components are essential to keeping up with ever more demanding customer requirements. Furthermore, design complexities are steadily growing with an increasing number of components that have to cooperate properly. Embedded system designers have to cope with multiple goals and constraints simul- neously, including timing, power, reliability, dependability, maintenance, packaging and, last but not least, price.

Smart Device to Smart Device Communication (Hardcover, 2014): Shahid Mumtaz, Jonathan Rodriguez Smart Device to Smart Device Communication (Hardcover, 2014)
Shahid Mumtaz, Jonathan Rodriguez
R3,423 Discovery Miles 34 230 Ships in 10 - 15 working days

This book presents a comprehensive analysis of D2D communication over LTE-A band. The book uses 3GPP LTE-A as a baseline and explains all fundamental requirements for deploying D2D network under cellular systems from an architectural, technical and business point of view. The contributors explain the standardization activities of Release 12 of LTE-A, which has been recently acknowledged as support of D2D communication in LTE-A. The text updates the research community on the D2D roadmap as well as new features emerging for consideration in 3GPP.

Configuring Juniper Networks NetScreen and SSG Firewalls (Paperback): Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin Configuring Juniper Networks NetScreen and SSG Firewalls (Paperback)
Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin
R1,077 R843 Discovery Miles 8 430 Save R234 (22%) Ships in 10 - 15 working days

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.
Configure Juniper s Instant Virtual Extranet (IVE)
Install and set up IVE through either the command line interface (CLI) or Web-based console.
Master the 3 Rs: Realms, Roles, and Resources
Realize the potential of the 3Rs for endpoint security, sign-in policies, and authorization of servers.
Get Inside both the Windows and Java Versions of Secure Application Manager (SAM)
Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field.
Integrate IVE with Terminal Services and Citrix
Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet.
Ensure Endpoint Security
Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network.
Manage the Remote Access Needs of Your Organization
Configure Web access, file access and telnet/SSH access for remote users and offices.
Configure Core Networking Components through the System Menu
Create clusters, manage virtual systems, and monitor logs, reports, and alerts.
Create Bullet-Proof Sign-in Policies
Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages.
Use the IVE for Log-Related Tasks
Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting."

Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.): Nikolaos P. Preve Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.)
Nikolaos P. Preve
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book presents research from many of the major projects involved in the emerging global grid infrastructure. With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs. Topics: examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures; describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks; investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems; explores job control using service-level agreements; introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix; discusses the PhyloGrid application, and a numerical simulation performed using grid computing.

Network-Embedded Management and Applications - Understanding Programmable Networking Infrastructure (Hardcover, 2012):... Network-Embedded Management and Applications - Understanding Programmable Networking Infrastructure (Hardcover, 2012)
Alexander Clemm, Ralf Wolter
R4,737 Discovery Miles 47 370 Ships in 18 - 22 working days

Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency.

In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "

IPv6 Core Protocols Implementation (Hardcover): Qing Li, Tatuya Jinmei, Keiichi Shima IPv6 Core Protocols Implementation (Hardcover)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,932 Discovery Miles 19 320 Ships in 10 - 15 working days

IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago.

This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.
Covering a snapshot version of KAME dated April 2003 based on FreeBSD 4.8Extensive line-by-line code listings with meticulous explanation of their rationale and use for the KAME snapshot implementation, which is generally applicable to most recent versions of the KAME IPv6 stack including those in recent releases of BSD variantsNumerous diagrams and illustrations help in visualizing the implementation In-depth discussion of the standards provides intrinsic understanding of the specifications

Information Security Governance (Hardcover, 1st Edition.
2nd Printing. 2008): S.H. Solms, Rossouw Solms Information Security Governance (Hardcover, 1st Edition. 2nd Printing. 2008)
S.H. Solms, Rossouw Solms
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry.

Deploying IP and MPLS QoS for Multiservice Networks - Theory and Practice (Hardcover): John William Evans, Clarence Filsfils Deploying IP and MPLS QoS for Multiservice Networks - Theory and Practice (Hardcover)
John William Evans, Clarence Filsfils
R1,428 Discovery Miles 14 280 Ships in 10 - 15 working days

QoS, short for "quality of service," is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional.
The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations.
*Helps readers understand concepts of IP QoS by presenting clear descriptions of QoS components, architectures, and protocols
*Directs readers in the design and deployment of IP QoS networks through fully explained examples of actual working designs
*Contains real life case studies which focus on implementation

Network Classification for Traffic Management - Anomaly detection, feature selection, clustering and classification... Network Classification for Traffic Management - Anomaly detection, feature selection, clustering and classification (Hardcover)
Zahir Tari, Adil Fahad, Abdulmohsen Almalawi, Xun Yi
R3,104 R2,806 Discovery Miles 28 060 Save R298 (10%) Ships in 18 - 22 working days

With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling short. Novel approaches using machine learning algorithms are needed to cope with and manage real-world network traffic, including supervised, semi-supervised, and unsupervised classification techniques. Accurate and effective classification of network traffic will lead to better quality of service and more secure and manageable networks. This authored book investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated enterprise-scale networks. The authors explore novel methods for enhancing network statistics at the transport layer, helping to identify optimal feature selection through a global optimization approach and providing automatic labelling for raw traffic through a SemTra framework to maintain provable privacy on information disclosure properties.

Spectrum Access and Management for Cognitive Radio Networks (Hardcover, 1st ed. 2017): Mohammad A. Matin Spectrum Access and Management for Cognitive Radio Networks (Hardcover, 1st ed. 2017)
Mohammad A. Matin
R3,928 R3,397 Discovery Miles 33 970 Save R531 (14%) Ships in 10 - 15 working days

This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and... Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and Modelling (ONDM 2002) February 4-6, 2002, Torino, Italy (Hardcover, 2003 ed.)
Andrea Bianco, Fabio Neri
R2,926 Discovery Miles 29 260 Ships in 18 - 22 working days

Optical networks are leaving the labs and becoming a reality. Despite the current crisis of the telecom industry, our everyday life increasingly depends on communication networks for information exchange, medicine, education, data transfer, commerce, and many other endeavours. High capacity links are required by the large futemet traffic demand, and optical networks remain one of the most promising technologies for meeting these needs. WDM systems are today widely deployed, thanks to low-cost at extreme data rates and high reliability of optical components, such as optical amplifiers and fixed/tunable filters and transceivers. Access and metropolitan area networks are increasingly based on optical technologies to overcome the electronic bottleneck at the network edge. Traditional multi-layer architectures, such as the widely deployed IP/ATM/SDH protocol stack, are increasingly based on WDM transport; further efforts are sought to move at the optical layer more of the functionalities available today in higher protocol layers. New components and subsystems for very high speed optical networks offer new design opportunities to network operators and designers. The trends towards dynamically configurable all-optical network infrastructures open up a wide range of new network engineering and design choices, which must face issues such as interoperability and unified control and management.

Partitional Clustering Algorithms (Hardcover, 2015 ed.): M. Emre Celebi Partitional Clustering Algorithms (Hardcover, 2015 ed.)
M. Emre Celebi
R4,127 R3,596 Discovery Miles 35 960 Save R531 (13%) Ships in 10 - 15 working days

This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, … Hardcover R3,333 R3,010 Discovery Miles 30 100
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210

 

Partners