0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,634)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Intelligent Renewable Energy Systems - Modelling and Control (Hardcover, 1st ed. 2016): Gerasimos Rigatos Intelligent Renewable Energy Systems - Modelling and Control (Hardcover, 1st ed. 2016)
Gerasimos Rigatos
R4,985 Discovery Miles 49 850 Ships in 10 - 15 working days

Focused on renewable energy systems and the development of information and communication technologies (ICTs) for their integration in smart grids, this book presents recent advances and methods that help to ensure that power generation from renewable sources remains stable, that power losses are minimized, and that the reliable functioning of these power generation units is maintained. The book highlights key topics and technologies for renewable energy systems including the intelligent control of power generators, power electronics that connect renewable power generation units to the grid, and fault diagnosis for power generators and power electronics. In particular, the following topics are addressed: * Modeling and control of power generators (PMSGs, DFIGs); * Modeling and control of power electronics (converters, inverters); * Modeling and fault diagnosis of the transmission and distribution Grid; and * Modelling and control of distributed power generation units (interconnected synchronous generators or photovoltaic units). Because of the above coverage, members of the wider engineering community will find that the nonlinear control and estimation methods presented provide essential insights into the functioning of renewable energy power systems, while the academic community will find the book a valuable textbook for undergraduate or graduate courses on renewable energy systems.

Pro Open Source Mail - Building an Enterprise Mail Solution (Hardcover, 1st ed.): Curtis Smith Pro Open Source Mail - Building an Enterprise Mail Solution (Hardcover, 1st ed.)
Curtis Smith
R1,511 Discovery Miles 15 110 Ships in 18 - 22 working days

Providing the range of mail-related services expected by organizations can be a confusing, daunting process. "Pro Open Source Mail: Building an Enterprise Mail Solution" presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus protection, spam and e-mail filtering, web-based e-mail, and mailing list maintenance.

Beginning with installation and configuration of the popular server-based operating system Fedora Core, the book outlines the system and network preparation process geared towards running a complete enterprise e-mail system. Subsequent chapters cover installation and configuration of sendmail, the popular POP3/IMAP server Dovecot, and ClamAV and SpamAssassin for virus protection and spam filtering. With a nod to the global e-mail availability now required by many organizations, this book also guides you through configuration of a web-based mail interface, mailing-list software, and advanced security and privacy topics.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Biometric Authentication in Online Learning Environments (Hardcover): A.V. Senthil Kumar Biometric Authentication in Online Learning Environments (Hardcover)
A.V. Senthil Kumar
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.

Introduction to Modern Sleep Technology (Hardcover, 2012 ed.): Rayleigh Ping-Ying Chiang, Shih-Chun Kang Introduction to Modern Sleep Technology (Hardcover, 2012 ed.)
Rayleigh Ping-Ying Chiang, Shih-Chun Kang
R2,692 Discovery Miles 26 920 Ships in 18 - 22 working days

Sleep medicine has been developing for more than 40 years. The current concepts in sleep technology are mainly centered on polysomnography (PSG) and issues related to sleep technicians. However, the editorsbelieve that the true value of technology is revealed only when benefits to humanity are manifest. To this end, they endeavor to create a new era in sleep technology, one that will improve the quality of people's sleep and daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Microsoft Exchange Server 2007 with SP1 - Tony Redmond's Guide to Successful Implementation (Paperback): Tony Redmond Microsoft Exchange Server 2007 with SP1 - Tony Redmond's Guide to Successful Implementation (Paperback)
Tony Redmond
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality.
Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:
*install enabling on Windows Server 2008
*IVp6 support
*Unified Messaging inclusion
*EMC enhancements
*Client Access Improvements for Outlook Web Access and Activesync
*New user interfaces for POP3 and IMAP4
*System resource monitoring and message routing improvements
*New features for the mailbox server role
*.pst file data managment improvements
*new high-availability features
*optimization for mobile access
*and much more
*Complete coverage of all the updates in SP1 ensure admins skip the initial 2007 release's bugs and upgrade with ease
*Written by HP Services CTO Tony Redmond, the world's most trusted author of Exchange books for over a decade
*250+ pages of updates throughout, including totally new sections on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and 6.1 devices, Apple iPhone, and more

The Best Damn Firewall Book Period (Paperback, 2nd edition): Thomas W. Shinder The Best Damn Firewall Book Period (Paperback, 2nd edition)
Thomas W. Shinder
R1,302 Discovery Miles 13 020 Ships in 10 - 15 working days

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.
Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.
Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.
New to this Edition:
* Microsoft firewall protection, from Windows Firewall to ISA Server 2006
* Cisco PIX Version 7, including VPN configuration and IDS
* Analyzing Firewall Logs and Reports
* VoIP and Firewall Bypassing

Trustworthy Ubiquitous Computing (English, Bosnian, Hardcover, 2012 ed.): Ismail Khalil, Teddy Mantoro Trustworthy Ubiquitous Computing (English, Bosnian, Hardcover, 2012 ed.)
Ismail Khalil, Teddy Mantoro
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to "emerged and exciting new computing paradigm of Ubiquitous Computing", includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Marc Weiser presented his vision of disappearing and ubiquitous computing more than 15 years ago. The big picture of the computer introduced into our environment was a big innovation and the starting point for various areas of research. In order to totally adopt the idea of ubiquitous computing several houses were build, equipped with technology and used as laboratory in order to find and test appliances that are useful and could be made available in our everyday life. Within the last years industry picked up the idea of integrating ubiquitous computing and already available products like remote controls for your house were developed and brought to the market. In spite of many applications and projects in the area of ubiquitous and pervasive computing the success is still far away. One of the main reasons is the lack of acceptance of and confidence in this technology. Although researchers and industry are working in all of these areas a forum to elaborate security, reliability and privacy issues, that resolve in trustworthy interfaces and computing environments for people interacting within these ubiquitous environments is important. The user experience factor of trust thus becomes a crucial issue for the success of a UbiComp application. The goal of this book is to provide a state the art of Trustworthy Ubiquitous Computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues.

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure... An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure Protection (Hardcover, 2012)
S.V. Raghavan, E. Dawson
R2,699 Discovery Miles 26 990 Ships in 18 - 22 working days

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019): Aboul... Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny
R3,821 Discovery Miles 38 210 Ships in 18 - 22 working days

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.

Novel Practices and Trends in Grid and Cloud Computing (Hardcover): Pethuru Raj, S Koteeswaran Novel Practices and Trends in Grid and Cloud Computing (Hardcover)
Pethuru Raj, S Koteeswaran
R6,346 Discovery Miles 63 460 Ships in 18 - 22 working days

Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.

Digital Design (VHDL) - An Embedded Systems Approach Using VHDL (Paperback): Peter J Ashenden Digital Design (VHDL) - An Embedded Systems Approach Using VHDL (Paperback)
Peter J Ashenden
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

"Digital Design: An Embedded Systems Approach Using VHDL" provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It takes an up-to-date and modern approach of presenting digital logic design as an activity in a larger systems design context.
Rather than focus on aspects of digital design that have little relevance in a realistic design context, this book concentrates on modern and evolving knowledge and design skills. Hardware description language (HDL)-based design and verification is emphasized--VHDL examples are used extensively throughout. By treating digital logic as part of embedded systems design, this book provides an understanding of the hardware needed in the analysis and design of systems comprising both hardware and software components.
Includes a Web site with links to vendor tools, labs and tutorials.
Presents digital logic design as an activity in a larger systems design context.
Features extensive use of VHDL examples to demonstrate HDL (hardware description language) usage at the abstract behavioural level and register transfer level, as well as for low-level verification and verification environments.
Includes worked examples throughout to enhance the reader's understanding and retention of the material.
Companion Web site includes links to tools for FPGA design from Synplicity, Mentor Graphics, and Xilinx, VHDL source code for all the examples in the book, lecture slides, laboratory projects, and solutions to exercises."

Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E... Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, Tokyo, Japan (Hardcover, 2008 ed.)
Makoto Oya, Ryuya Uda, Chizuko Yasunobu
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.

Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca,... Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 (Hardcover, 2008 ed.)
Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. Aside the adoption of Internet as the global network infrastructure these last years have shown the growing of a set of new network architectures without a rigid and known a priori architecture using wireless techniques, like sensor and ad-hoc networks. These new types of networks are opening the possibility to create a large number of new applications ranging from domestic to nature surveying. These new networks are generating new technical challenges like the capability of auto-reconfiguration in order to give the network an optimal configuration, the energy saving need when the nodes have not a source of energy other than a small battery, new protocols to access the network and to convey the information across the network when its structure is not completely known or should be discovered, new paradigms for keeping the needed information security and privacy in a quite uncontrolled environment, and others.

Software Defined Networks - A Comprehensive Approach (Paperback): Paul Goransson, Chuck Black Software Defined Networks - A Comprehensive Approach (Paperback)
Paul Goransson, Chuck Black
R1,041 Discovery Miles 10 410 Ships in 10 - 15 working days

"Software Defined Networks" discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN modelHow to make intelligent decisions about when to integrate SDN technologies in a networkHow to decide if your organization should be developing its own SDN applications or looking to acquire these from an outside vendorHow to accelerate the ability to develop your own SDN application, be it entirely novel or a more efficient approach to a long-standing problem
Discusses the evolution of the switch platforms that enable SDN Addresses when to integrate SDN technologies in a networkProvides an overview of sample SDN applications relevant to different industriesIncludes practical examples of how to write SDN applications

Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.): Joyce... Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.)
Joyce Westerink, Martin Ouwerkerk, Therese J. M. Overbeek, W. Frank Pasveer
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

This book adheres to the vision that in the future compelling user experiences will be key differentiating benefits of products and services. Evaluating the user experience plays a central role, not only during the design process, but also during regular usage: for instance a video recorder that recommends TV programs that fit your current mood, a product that measures your current level of relaxation and produces advice on how to balance your life, or a module that alerts a factory operator when he is getting drowsy. Such systems are required to assess and interpret user experiences (almost) in real-time, and that is exactly what this book is about. How to achieve this? What are potential applications of psychophysiological measurements? Are real-time assessments based on monitoring of user behavior possible? If so, which elements are critical? Are behavioral aspects important? Which technology can be used? How important are intra-individual differences? What can we learn from products already on the market? The book gathers a group of invited authors from different backgrounds, such as technology, academy and business. This is a mosaic of their work, and that of Philips Research, in the assessment of user experience, covering the full range from academic research to commercial propositions..

Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover): Francesca... Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover)
Francesca Comunello
R4,467 Discovery Miles 44 670 Ships in 18 - 22 working days

The recent popularity of Social Network Sites (SNS) shows that there is a growing interest in articulating, making visible, and managing personal or professional relationships through technology-enabled environments. Networked Sociability and Individualism: Technology for Personal and Professional Relationships provides a multidisciplinary framework for analyzing the new forms of sociability enabled by digital media and networks. This book focuses on a variety of social media and computer-mediated communication environments with the aim of identifying and understanding different types of social behavior and identity expression.

Wireless Communications & Networking (Hardcover): Vijay Garg Wireless Communications & Networking (Hardcover)
Vijay Garg
R2,209 Discovery Miles 22 090 Ships in 10 - 15 working days

This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN).
The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.)
After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems.
A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts.
Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students.
*Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN)
*Comprehensive and up-to-date coverage including the latest in standards and 4G technology
*Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R956 R835 Discovery Miles 8 350 Save R121 (13%) Ships in 18 - 22 working days
Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover): Information Resources Management... Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover)
Information Resources Management Association
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

The internet has grown to become one of the largest communication hubs in history. With its ability to share content and create community bonds, it has seen many fandoms and online social communities develop within the past decades. While there are some detriments to these communities, there are also many benefits and potential uses for the betterment of society. The Research Anthology on Fandoms, Online Social Communities, and Pop Culture explores the ways in which the internet has presented itself as a platform for communities to gather. This essential reference source discusses the engagement of these communities, social media use, and the uses of these communities for education. Covering topics such as digital communities, transmedia language learning, and digital humanities, this book is a vital tool for educators of K-12 and higher education, digital folklorists, sociologists, communications researchers, online administrators, community leaders, and academicians.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R7,802 Discovery Miles 78 020 Ships in 18 - 22 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R7,808 Discovery Miles 78 080 Ships in 18 - 22 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Content Delivery Networks (Hardcover, 2008 ed.): Rajkumar Buyya, Mukaddim Pathan, Athena Vakali Content Delivery Networks (Hardcover, 2008 ed.)
Rajkumar Buyya, Mukaddim Pathan, Athena Vakali
R5,888 Discovery Miles 58 880 Ships in 18 - 22 working days

"Content Delivery Networks" enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.

Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.): Shafiullah Khan, Al-Sakib Khan... Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.)
Shafiullah Khan, Al-Sakib Khan Pathan
R6,061 R4,929 Discovery Miles 49 290 Save R1,132 (19%) Ships in 10 - 15 working days

"Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.

Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS... Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS 2009, Langenargen, Germany, September 14-16, 2009, Proceedings (Hardcover, 2009 ed.)
Achim Rettberg, Mauro C. Zanella, Michael Amann, Michael Keckeisen, Franz J. Rammig
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This book presents the technical program of the International Embedded Systems Symposium (IESS) 2009. Timely topics, techniques and trends in embedded system design are covered by the chapters in this volume, including modelling, simulation, verification, test, scheduling, platforms and processors. Particular emphasis is paid to automotive systems and wireless sensor networks. Sets of actual case studies in the area of embedded system design are also included. Over recent years, embedded systems have gained an enormous amount of proce- ing power and functionality and now enter numerous application areas, due to the fact that many of the formerly external components can now be integrated into a single System-on-Chip. This tendency has resulted in a dramatic reduction in the size and cost of embedded systems. As a unique technology, the design of embedded systems is an essential element of many innovations. Embedded systems meet their performance goals, including real-time constraints, through a combination of special-purpose hardware and software components tailored to the system requirements. Both the development of new features and the reuse of existing intellectual property components are essential to keeping up with ever more demanding customer requirements. Furthermore, design complexities are steadily growing with an increasing number of components that have to cooperate properly. Embedded system designers have to cope with multiple goals and constraints simul- neously, including timing, power, reliability, dependability, maintenance, packaging and, last but not least, price.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Automated DNA Sequencing and Analysis
Mark D. Adams, Chris Fields, … Hardcover R1,375 Discovery Miles 13 750
Gene Drives at Tipping Points
Arnim von Gleich, Winfried Schroeder Hardcover R1,430 Discovery Miles 14 300
RNA Methodologies - A Laboratory Guide…
Robert E. Farrell Jr Paperback R3,455 Discovery Miles 34 550
Phenotypic Variation - Exploration and…
Moyra Smith Hardcover R2,372 Discovery Miles 23 720
Stress: Genetics, Epigenetics and…
George Fink Hardcover R3,072 Discovery Miles 30 720
Statistical Genomics - Linkage, Mapping…
Ben Hui Liu Hardcover R5,402 Discovery Miles 54 020
The Chemical Dialogue Between Plants and…
Vivek Sharma, Richa Salwan, … Paperback R3,943 Discovery Miles 39 430
Methods in Gene Technology, Volume 2
JW Dale, P.G. Sanders Hardcover R1,218 Discovery Miles 12 180
Genetically Modified Plants - Assessing…
Roger Hull, Graham Head, … Hardcover R3,045 Discovery Miles 30 450
Heredity - a Psychological Study of Its…
Th (The&#769odule) 1839-1916 Ribot Hardcover R982 Discovery Miles 9 820

 

Partners