0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (333)
  • R250 - R500 (880)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Hardcover, 1st ed. 2020): Irmgard... Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Hardcover, 1st ed. 2020)
Irmgard Niemeyer, Mona Dreicer, Gotthard Stein
R5,170 Discovery Miles 51 700 Ships in 12 - 17 working days

This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.

Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover): Alex Chi Keung Ng Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover)
Alex Chi Keung Ng
R4,801 Discovery Miles 48 010 Ships in 12 - 17 working days

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization's identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Body Sensor Networks (Hardcover, 2nd ed. 2014): Guang-Zhong Yang Body Sensor Networks (Hardcover, 2nd ed. 2014)
Guang-Zhong Yang
R3,278 Discovery Miles 32 780 Ships in 10 - 15 working days

The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing.

In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering.

Biosensor Design, Interfacing and Nanotechnology

Wireless Communication and Network Topologies

Communication Protocols and Standards

Energy Harvesting and Power Delivery

Ultra-low Power Bio-inspired Processing

Multi-sensor Fusion and Context Aware Sensing

Autonomic Sensing

Wearable, Ingestible Sensor Integration and Exemplar Applications

System Integration and Wireless Sensor Microsystems

The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.

Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover): Shadi Aljawarneh, Manisha... Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover)
Shadi Aljawarneh, Manisha Malhotra
R6,154 Discovery Miles 61 540 Ships in 12 - 17 working days

Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm.

Multimedia Data Engineering Applications and Processing (Hardcover, New): Shu-Ching Chen, Mei-Ling Shyu Multimedia Data Engineering Applications and Processing (Hardcover, New)
Shu-Ching Chen, Mei-Ling Shyu
R5,255 Discovery Miles 52 550 Ships in 12 - 17 working days

With a variety of media types, multimedia data engineering has emerged as a new opportunity to create techniques and tools that empower the development of the next generation of multimedia databases and information systems. Multimedia Data Engineering Applications and Processing presents different aspects of multimedia data engineering and management research. This collection of recent theories, technologies and algorithms brings together a detailed understanding of multimedia engineering and its applications. This reference source will be of essential use for researchers, scientists, professionals and software engineers in the field of multimedia.

Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,352 Discovery Miles 33 520 Ships in 12 - 17 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Advanced Technologies in Ad Hoc and Sensor Networks - Proceedings of the 7th China Conference on Wireless Sensor Networks... Advanced Technologies in Ad Hoc and Sensor Networks - Proceedings of the 7th China Conference on Wireless Sensor Networks (Hardcover, 2014 ed.)
Xue Wang, Li Cui, Zhongwen Guo
R4,994 Discovery Miles 49 940 Ships in 12 - 17 working days

"Advanced Technologies in Ad Hoc and Sensor Networks "collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of Advances in wireless sensor networks of China . The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book.

Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China."

Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover): Information Resources Management... Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover)
Information Resources Management Association
R10,307 Discovery Miles 103 070 Ships in 10 - 15 working days

The internet has grown to become one of the largest communication hubs in history. With its ability to share content and create community bonds, it has seen many fandoms and online social communities develop within the past decades. While there are some detriments to these communities, there are also many benefits and potential uses for the betterment of society. The Research Anthology on Fandoms, Online Social Communities, and Pop Culture explores the ways in which the internet has presented itself as a platform for communities to gather. This essential reference source discusses the engagement of these communities, social media use, and the uses of these communities for education. Covering topics such as digital communities, transmedia language learning, and digital humanities, this book is a vital tool for educators of K-12 and higher education, digital folklorists, sociologists, communications researchers, online administrators, community leaders, and academicians.

Fiber Network Service Survivability (Hardcover): Tsong-Ho Wu Fiber Network Service Survivability (Hardcover)
Tsong-Ho Wu
R3,502 Discovery Miles 35 020 Ships in 10 - 15 working days

This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.

Topology Control in Wireless Ad Hoc and Sensor Networks (Hardcover): P Santi Topology Control in Wireless Ad Hoc and Sensor Networks (Hardcover)
P Santi
R2,989 Discovery Miles 29 890 Ships in 12 - 17 working days

Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks.

Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting ranges. Briefly, "topology control" (TC) is the art of co-ordinating nodes' decisions regarding their transmitting ranges, to generate a network with the desired features. Building an optimized network topology helps surpass the prevalent scalability and capacity problems.

"Topology Control in Wireless Ad Hoc and Sensor Networks" makes the case for topology control and provides an exhaustive coverage of TC techniques in wireless ad hoc and sensor networks, considering both stationary networks, to which most of the existing solutions are tailored, and mobile networks. The author introduces a new taxonomy of topology control and gives a full explication of the applications and challenges of this important topic.

"Topology Control in Wireless Ad Hoc and Sensor Networks: " Defines topology control and explains its necessity, considering both stationary and mobile networks. Describes the most representative TC protocols and their performance. Covers the critical transmitting range for stationary and mobile networks, topology optimization problems such as energy efficiency, and distributed topology control. Discusses implementation and 'open issues', including realistic models and the effect of multi-hop data traffic. Presents a case study on routing protocol design, to demonstrate how TC can ease the design of cooperative routing protocols.

This invaluable text will provide graduatestudents in Computer Science, Electrical and Computer Engineering, Applied Mathematics and Physics, researchers in the field of ad hoc networking, and professionals in wireless telecoms as well as networking system developers with a single reference resource on topology control.

Beyond the Internet of Things - Everything Interconnected (Hardcover, 1st ed. 2017): Jordi Mongay Batalla, George Mastorakis,... Beyond the Internet of Things - Everything Interconnected (Hardcover, 1st ed. 2017)
Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R5,003 Discovery Miles 50 030 Ships in 12 - 17 working days

The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.

VLSI 2010 Annual Symposium - Selected papers (Hardcover, 2011): Nikolaos Voros, Amar Mukherjee, Nicolas Sklavos, Konstantinos... VLSI 2010 Annual Symposium - Selected papers (Hardcover, 2011)
Nikolaos Voros, Amar Mukherjee, Nicolas Sklavos, Konstantinos Masselos, Michael Huebner
R5,751 Discovery Miles 57 510 Ships in 10 - 15 working days

VLSI 2010 Annual Symposium will present extended versions of the best papers presented in ISVLSI 2010 conference. The areas covered by the papers will include among others: Emerging Trends in VLSI, Nanoelectronics, Molecular, Biological and Quantum Computing. MEMS, VLSI Circuits and Systems, Field-programmable and Reconfigurable Systems, System Level Design, System-on-a-Chip Design, Application-Specific Low Power, VLSI System Design, System Issues in Complexity, Low Power, Heat Dissipation, Power Awareness in VLSI Design, Test and Verification, Mixed-Signal Design and Analysis, Electrical/Packaging Co-Design, Physical Design, Intellectual property creating and sharing.

Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012... Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012 ed.)
Jong Hyuk (James) Park, Jongsung Kim, Deqing Zou, Yang Sun Lee
R5,685 R4,482 Discovery Miles 44 820 Save R1,203 (21%) Ships in 12 - 17 working days

The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services.
The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The ITCS-12 is the next event in a series of highly successful International Conference on Information Technology Convergence and Services(ITCS-11), previously held in Gwangju, Korea on October, 2011.

Surviving Cyberwar (Paperback): Richard Stiennon Surviving Cyberwar (Paperback)
Richard Stiennon
R1,421 Discovery Miles 14 210 Ships in 12 - 17 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Grids, P2P and Services Computing (Hardcover, 2010 ed.): Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour Grids, P2P and Services Computing (Hardcover, 2010 ed.)
Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour
R4,512 Discovery Miles 45 120 Ships in 12 - 17 working days

Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Handbook of Distributed Sensor Networks: Volume II (Hardcover): Marvin Heather Handbook of Distributed Sensor Networks: Volume II (Hardcover)
Marvin Heather
R3,063 Discovery Miles 30 630 Ships in 12 - 17 working days
Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.): Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez,... Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.)
Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez, William B. Lober, Mark Thurmond
R6,026 Discovery Miles 60 260 Ships in 10 - 15 working days

This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.

Interconnecting Smart Objects with IP - The Next Internet (Paperback): Jean-Philippe Vasseur, Adam Dunkels Interconnecting Smart Objects with IP - The Next Internet (Paperback)
Jean-Philippe Vasseur, Adam Dunkels
R1,589 Discovery Miles 15 890 Ships in 12 - 17 working days

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. "Interconnecting Smart Objects with IP" is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless sensor networks, ubiquitous and pervasive computing, mobile telephony and telemetry, and mobile computer networking. This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, and protocols for smart objects, and Part III provides case studies on how and where smart objects are being used today and in the future. The book covers the fundamentals of IP communication for smart objects, IPv6, and web services, as well as several newly specified low-power IP standards such as the IETF 6LoWPAN adaptation layer and the RPL routing protocol. This book contains essential information not only for the technical reader but also for policy makers and decision makers in the area of smart objects both for private IP networks and the Internet.
Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services

Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008)... Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008) (Paperback, 6th edition)
Jonathan Weissman, Mike Meyers
R924 Discovery Miles 9 240 Ships in 12 - 17 working days

Practice essential IT skills and prepare for the 2021 version of the CompTIA Network+ exam This thoroughly revised lab manual challenges you to solve real-world problems by learning to successfully apply the techniques contained in Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition. Clear, measurable lab objectives map directly to every topic on the test, enabling readers to pass the challenging exam with ease. Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008) contains more than 90 hands-on labs along with materials lists, lab setup details, and step-by-step instructions that require you to think critically. The book features special design elements that teach and reinforce retention. You will Lab Analysis questions and a Key Term Quiz that helps to build vocabulary. Contains 90+ hands-on labs with clear objectives and instructions Includes a 10% discount voucher coupon for the exam, a $32 value Lab solutions are not printed in the book and are only available to adopting instructors Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Chipless RFID - Design Procedure and Detection Techniques (Hardcover, 2015 ed.): Reza Rezaiesarlak, Majid Manteghi Chipless RFID - Design Procedure and Detection Techniques (Hardcover, 2015 ed.)
Reza Rezaiesarlak, Majid Manteghi
R3,974 R3,398 Discovery Miles 33 980 Save R576 (14%) Ships in 12 - 17 working days

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers chipless RFID components in block diagram representation and introduce FCC requirements which should be considered in the design procedure of each component. The third chapter is dedicated to the complex natural resonance-based design of chipless RFID tags. The next chapter concerns about the detection techniques introduced for the identification of chipless RFID tags. The fifth chapter is dedicated to the localization and anti-collision techniques in chipless RFID systems. Final chapter is chipless RFID tags as sensors. It provides some applications where the tag can be used as both ID and sensor. The tag specifications and detection issues are addressed in this section.

Economics of Information Security and Privacy III (Hardcover, 2012): Bruce Schneier Economics of Information Security and Privacy III (Hardcover, 2012)
Bruce Schneier
R4,864 Discovery Miles 48 640 Ships in 12 - 17 working days

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

Fundamentals of Optical Computing Technology - Forward the Next Generation Supercomputer (Hardcover, 1st ed. 2018): Xiujian Li,... Fundamentals of Optical Computing Technology - Forward the Next Generation Supercomputer (Hardcover, 1st ed. 2018)
Xiujian Li, Zhengzheng Shao, Mengjun Zhu, Junbo Yang
R5,213 Discovery Miles 52 130 Ships in 12 - 17 working days

This book presents the principles, experimental technologies, up-to-date research findings and applications of various optical-computing technologies and devices. It also discusses semiconductor multiple quantum well (MQW) photoelectronic devices, vertical-cavity surface-emitting lasers (VCSELs), lasers, micro optical elements and diffractive optical elements, optical storage, optical parallel interconnections, and optical-buffer technology as the main technologies for optical computing. Furthermore, it explores the potential of optical-computing technology. It offers those involved in optical design, photonics, and photoelectronic research and related industries insights into the fundamentals and theories of optical computing, enabling them and to extend and develop the functions of fundamental elements to meet the requirement of optical-computing systems.

Microsoft Virtualization - Master Microsoft Server, Desktop, Application, and Presentation Virtualization (Paperback): Thomas... Microsoft Virtualization - Master Microsoft Server, Desktop, Application, and Presentation Virtualization (Paperback)
Thomas Olzak, James Sabovik, Jason Boomer, Robert M. Keefer
R815 Discovery Miles 8 150 Ships in 12 - 17 working days

Virtualization technologies help IT organizations in three ways: cost-cutting, ease of administration, and the overall effect of IT on the environment. Virtualization cuts costs by reducing the amount of capital resources (equipment), power, and cooling to run an IT infrastructure. Because of the tools that are involved in virtualization, it also reduces the burden of IT management significantly. Finally, by reducing the amount of cooling, power, and other emissions from these servers, virtualization can help IT organizations become more "green."
Microsoft growth is up from 2006, when it held an 8% market share to 23%. When this report was released, Hyper-V had just started shipping, and is expected to make substantial market gain for Microsoft. A poor economy will actually help the growth of virtualization. Virtualization will gain IT dollars at the expense of other technologies for one reason: cost. Technologies that require high up-front expenditures but take time to generate ROI will be put on hold, while technologies like virtualization that promise immediate cost savings will enjoy broader adoption. Currenty, only 7% to 8% of servers are virtualized (worldwide) with many IT executives researching or planning to implement in the next 18 to 24 months.
Covers Microsoft virtualization products completely, including Hyper-V Includes a special section on securing virtual infrastructure Gives hands-on instructions to help understand and implement Microsoft solutions

Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.): Mohsen A. M. El-Bendary Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.)
Mohsen A. M. El-Bendary
R3,773 R3,479 Discovery Miles 34 790 Save R294 (8%) Ships in 12 - 17 working days

This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Hardcover)
Alan Grid
R1,088 Discovery Miles 10 880 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer Networks, Global Edition
Andrew Tanenbaum, Nick Feamster, … Paperback R2,573 R2,406 Discovery Miles 24 060
CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
Introduction to Copper Cabling…
John Crisp Paperback R985 Discovery Miles 9 850
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,223 Discovery Miles 12 230
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,773 Discovery Miles 37 730
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,251 Discovery Miles 12 510

 

Partners