0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (334)
  • R250 - R500 (886)
  • R500+ (13,957)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Policing Transnational Organized Crime and Corruption - Exploring the Role of Communication Interception Technology (Hardcover,... Policing Transnational Organized Crime and Corruption - Exploring the Role of Communication Interception Technology (Hardcover, New)
M. Congram, P. Bell, Mark Lauchs
R1,799 Discovery Miles 17 990 Ships in 12 - 17 working days

Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organised crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises.Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organised crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing.Policing Transnational Organised Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.

Network Simulation Experiments Manual (Paperback, 3rd edition): Emad Aboelela Network Simulation Experiments Manual (Paperback, 3rd edition)
Emad Aboelela
R708 Discovery Miles 7 080 Ships in 12 - 17 working days

Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work by utilizing a software tool that simulates the functions within a network. The tool provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance.

"The Network Simulation Experiments Manual" takes this instructional tool a step further and provides detailed experiments on core networking topologies for use in this simulation environment. Various scenarios are presented within each topology: Review questions, suggested readings, a lab report, and exercises accompanying each assignment. The manual also comes with directions for downloading the free and easy-to-install OPNET IT Guru Academic Edition software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. Prepared by Professor Emad Aboelela of the Taibah University, Saudi Arabia, the experiments in the manual are closely tied to the organization of "Computer Networks: A Systems Approach, Fifth Edition" and, when used together, serve as a complete tool for understanding how and why computer networks function as they do.
*Updated and expanded by aninstructor who has used OPNET simulation tools in his classroom for numerous demonstrations and real-world scenarios.
* Software download based on an award-winning product made by OPNET Technologies, Inc., whose software is used by thousands of commercial and government organizations worldwide, and by over 500 universities.
*Useful experimentation for professionals in the workplace who are interested in learningand demonstrating the capability of evaluating different commercial networking products, i.e., Cisco routers.
*Covers the core networking topologies and includes assignments on Switched LANs, Network Design, CSMA, RIP, TCP, Queuing Disciplines, Web Caching, etc."

Tools and Algorithms for the Construction and Analysis of Systems (Hardcover): Bernhard Steffen, Fabrice Kordon, Marieke Huisman Tools and Algorithms for the Construction and Analysis of Systems (Hardcover)
Bernhard Steffen, Fabrice Kordon, Marieke Huisman
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days
Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R5,077 Discovery Miles 50 770 Ships in 12 - 17 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Transferring Information Literacy Practices (Hardcover, 1st ed. 2019): Billy Tak Hoi Leung, Jingzhen Xie, Linlin Geng,... Transferring Information Literacy Practices (Hardcover, 1st ed. 2019)
Billy Tak Hoi Leung, Jingzhen Xie, Linlin Geng, Priscilla Nga Ian Pun
R3,443 Discovery Miles 34 430 Ships in 10 - 15 working days

This book focuses on information literacy for the younger generation of learners and library readers. It is divided into four sections: 1. Information Literacy for Life; 2. Searching Strategies, Disciplines and Special Topics; 3. Information Literacy Tools for Evaluating and Utilizing Resources; 4. Assessment of Learning Outcomes. Written by librarians with wide experience in research and services, and a strong academic background in disciplines such as the humanities, social sciences, information technology, and library science, this valuable reference resource combines both theory and practice. In today's ever-changing era of information, it offers students of library and information studies insights into information literacy as well as learning tips they can use for life.

Spatial Network Big Databases - Queries and Storage Methods (Hardcover, 1st ed. 2017): Kwangsoo Yang, Shashi Shekhar Spatial Network Big Databases - Queries and Storage Methods (Hardcover, 1st ed. 2017)
Kwangsoo Yang, Shashi Shekhar
R3,179 Discovery Miles 31 790 Ships in 10 - 15 working days

This book provides a collection of concepts, algorithms, and techniques that effectively harness the power of Spatial Network Big Data. Reading this book is a first step towards understanding the immense challenges and novel applications of SNBD database systems. This book explores these challenges via investigating scalable graph-based query processing strategies and I/O efficient storage and access methods. This book will be of benefit to academics, researchers, engineers with a particular interest in network database models, network query processing, and physical storage models.

IT Convergence and Security 2017 - Volume 2 (Hardcover, 1st ed. 2018): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek IT Convergence and Security 2017 - Volume 2 (Hardcover, 1st ed. 2018)
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
R4,819 Discovery Miles 48 190 Ships in 12 - 17 working days

This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research, industrial and commercial activities and consists of contributions covering topics including machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful Inter national Conferences on IT Convergence and Security, previously held in Prague, Czech Republic (2016), Kuala Lumpur, Malaysia (2015), Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).

Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications (Hardcover): Indranil Bose Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications (Hardcover)
Indranil Bose
R5,391 Discovery Miles 53 910 Ships in 12 - 17 working days

Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to continuity and success of operations. ""Breakthrough Perspectives in Network and Data Communications Security, Design and Applications"" addresses key issues and offers expert viewpoints into the field of network and data communications, providing the academic, information technology, and managerial communities with the understanding necessary to implement robust, secure, and effective solutions. This much-needed addition to library and professional collections offers a matchless set of high quality research articles and premier technologies to address the most salient issues in network and data communications.

Cyber Attacks - Protecting National Infrastructure (Hardcover): Edward Amoroso Cyber Attacks - Protecting National Infrastructure (Hardcover)
Edward Amoroso
R1,240 Discovery Miles 12 400 Ships in 12 - 17 working days

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Cybersecurity Risk of IoT on Smart Cities (Hardcover, 1st ed. 2021): Roberto O. Andrade, Luis Tello-Oquendo, Ivan Ortiz Cybersecurity Risk of IoT on Smart Cities (Hardcover, 1st ed. 2021)
Roberto O. Andrade, Luis Tello-Oquendo, Ivan Ortiz
R3,658 Discovery Miles 36 580 Ships in 10 - 15 working days

This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating technologies such as IoT to achieve the sustainable development goals (SDGs) within the agenda 2030. Furthermore, it includes an analysis of the cyber security challenges generated by IoT systems due to factors such as heterogeneity, lack of security in design and few hardware resources in these systems, and how they should be addressed from a risk analysis approach, evaluating the risk analysis methodologies widely used in traditional IT systems.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R4,198 R3,622 Discovery Miles 36 220 Save R576 (14%) Ships in 12 - 17 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests.

"Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."

Computational Aspects and Applications in Large-Scale Networks - NET 2017, Nizhny Novgorod, Russia, June 2017 (Hardcover, 1st... Computational Aspects and Applications in Large-Scale Networks - NET 2017, Nizhny Novgorod, Russia, June 2017 (Hardcover, 1st ed. 2018)
Valery A. Kalyagin, Panos M. Pardalos, Oleg Prokopyev, Irina Utkina
R2,981 Discovery Miles 29 810 Ships in 10 - 15 working days

Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.

Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Hardcover, 1st ed. 2020): Irmgard... Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Hardcover, 1st ed. 2020)
Irmgard Niemeyer, Mona Dreicer, Gotthard Stein
R5,170 Discovery Miles 51 700 Ships in 12 - 17 working days

This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.

Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover): Alex Chi Keung Ng Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover)
Alex Chi Keung Ng
R4,801 Discovery Miles 48 010 Ships in 12 - 17 working days

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization's identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Body Sensor Networks (Hardcover, 2nd ed. 2014): Guang-Zhong Yang Body Sensor Networks (Hardcover, 2nd ed. 2014)
Guang-Zhong Yang
R3,278 Discovery Miles 32 780 Ships in 10 - 15 working days

The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing.

In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering.

Biosensor Design, Interfacing and Nanotechnology

Wireless Communication and Network Topologies

Communication Protocols and Standards

Energy Harvesting and Power Delivery

Ultra-low Power Bio-inspired Processing

Multi-sensor Fusion and Context Aware Sensing

Autonomic Sensing

Wearable, Ingestible Sensor Integration and Exemplar Applications

System Integration and Wireless Sensor Microsystems

The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.

Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover): Shadi Aljawarneh, Manisha... Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover)
Shadi Aljawarneh, Manisha Malhotra
R6,154 Discovery Miles 61 540 Ships in 12 - 17 working days

Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm.

Multimedia Data Engineering Applications and Processing (Hardcover, New): Shu-Ching Chen, Mei-Ling Shyu Multimedia Data Engineering Applications and Processing (Hardcover, New)
Shu-Ching Chen, Mei-Ling Shyu
R5,255 Discovery Miles 52 550 Ships in 12 - 17 working days

With a variety of media types, multimedia data engineering has emerged as a new opportunity to create techniques and tools that empower the development of the next generation of multimedia databases and information systems. Multimedia Data Engineering Applications and Processing presents different aspects of multimedia data engineering and management research. This collection of recent theories, technologies and algorithms brings together a detailed understanding of multimedia engineering and its applications. This reference source will be of essential use for researchers, scientists, professionals and software engineers in the field of multimedia.

Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,352 Discovery Miles 33 520 Ships in 12 - 17 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Advanced Technologies in Ad Hoc and Sensor Networks - Proceedings of the 7th China Conference on Wireless Sensor Networks... Advanced Technologies in Ad Hoc and Sensor Networks - Proceedings of the 7th China Conference on Wireless Sensor Networks (Hardcover, 2014 ed.)
Xue Wang, Li Cui, Zhongwen Guo
R4,994 Discovery Miles 49 940 Ships in 12 - 17 working days

"Advanced Technologies in Ad Hoc and Sensor Networks "collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of Advances in wireless sensor networks of China . The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book.

Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China."

Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover): Information Resources Management... Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover)
Information Resources Management Association
R10,307 Discovery Miles 103 070 Ships in 10 - 15 working days

The internet has grown to become one of the largest communication hubs in history. With its ability to share content and create community bonds, it has seen many fandoms and online social communities develop within the past decades. While there are some detriments to these communities, there are also many benefits and potential uses for the betterment of society. The Research Anthology on Fandoms, Online Social Communities, and Pop Culture explores the ways in which the internet has presented itself as a platform for communities to gather. This essential reference source discusses the engagement of these communities, social media use, and the uses of these communities for education. Covering topics such as digital communities, transmedia language learning, and digital humanities, this book is a vital tool for educators of K-12 and higher education, digital folklorists, sociologists, communications researchers, online administrators, community leaders, and academicians.

Fiber Network Service Survivability (Hardcover): Tsong-Ho Wu Fiber Network Service Survivability (Hardcover)
Tsong-Ho Wu
R3,502 Discovery Miles 35 020 Ships in 10 - 15 working days

This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.

Topology Control in Wireless Ad Hoc and Sensor Networks (Hardcover): P Santi Topology Control in Wireless Ad Hoc and Sensor Networks (Hardcover)
P Santi
R2,989 Discovery Miles 29 890 Ships in 12 - 17 working days

Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks.

Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting ranges. Briefly, "topology control" (TC) is the art of co-ordinating nodes' decisions regarding their transmitting ranges, to generate a network with the desired features. Building an optimized network topology helps surpass the prevalent scalability and capacity problems.

"Topology Control in Wireless Ad Hoc and Sensor Networks" makes the case for topology control and provides an exhaustive coverage of TC techniques in wireless ad hoc and sensor networks, considering both stationary networks, to which most of the existing solutions are tailored, and mobile networks. The author introduces a new taxonomy of topology control and gives a full explication of the applications and challenges of this important topic.

"Topology Control in Wireless Ad Hoc and Sensor Networks: " Defines topology control and explains its necessity, considering both stationary and mobile networks. Describes the most representative TC protocols and their performance. Covers the critical transmitting range for stationary and mobile networks, topology optimization problems such as energy efficiency, and distributed topology control. Discusses implementation and 'open issues', including realistic models and the effect of multi-hop data traffic. Presents a case study on routing protocol design, to demonstrate how TC can ease the design of cooperative routing protocols.

This invaluable text will provide graduatestudents in Computer Science, Electrical and Computer Engineering, Applied Mathematics and Physics, researchers in the field of ad hoc networking, and professionals in wireless telecoms as well as networking system developers with a single reference resource on topology control.

Beyond the Internet of Things - Everything Interconnected (Hardcover, 1st ed. 2017): Jordi Mongay Batalla, George Mastorakis,... Beyond the Internet of Things - Everything Interconnected (Hardcover, 1st ed. 2017)
Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R5,003 Discovery Miles 50 030 Ships in 12 - 17 working days

The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.

VLSI 2010 Annual Symposium - Selected papers (Hardcover, 2011): Nikolaos Voros, Amar Mukherjee, Nicolas Sklavos, Konstantinos... VLSI 2010 Annual Symposium - Selected papers (Hardcover, 2011)
Nikolaos Voros, Amar Mukherjee, Nicolas Sklavos, Konstantinos Masselos, Michael Huebner
R5,751 Discovery Miles 57 510 Ships in 10 - 15 working days

VLSI 2010 Annual Symposium will present extended versions of the best papers presented in ISVLSI 2010 conference. The areas covered by the papers will include among others: Emerging Trends in VLSI, Nanoelectronics, Molecular, Biological and Quantum Computing. MEMS, VLSI Circuits and Systems, Field-programmable and Reconfigurable Systems, System Level Design, System-on-a-Chip Design, Application-Specific Low Power, VLSI System Design, System Issues in Complexity, Low Power, Heat Dissipation, Power Awareness in VLSI Design, Test and Verification, Mixed-Signal Design and Analysis, Electrical/Packaging Co-Design, Physical Design, Intellectual property creating and sharing.

Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012... Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012 ed.)
Jong Hyuk (James) Park, Jongsung Kim, Deqing Zou, Yang Sun Lee
R5,685 R4,482 Discovery Miles 44 820 Save R1,203 (21%) Ships in 12 - 17 working days

The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services.
The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The ITCS-12 is the next event in a series of highly successful International Conference on Information Technology Convergence and Services(ITCS-11), previously held in Gwangju, Korea on October, 2011.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,908 Discovery Miles 59 080
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,508 Discovery Miles 15 080
Distributed Systems: Theory and…
Ghosh Hardcover R2,568 Discovery Miles 25 680
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,491 Discovery Miles 14 910
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,351 Discovery Miles 13 510
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050

 

Partners