0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (362)
  • R250 - R500 (937)
  • R500+ (14,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008): Slawomir Stanczak,... Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008)
Slawomir Stanczak, Marcin Wiczanowski, Holger Boche
R3,051 Discovery Miles 30 510 Ships in 10 - 15 working days

The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.

Smart Grids: Security and Privacy Issues (Hardcover, 1st ed. 2017): Kianoosh G. Boroojeni, M. Hadi Amini, S.S. Iyengar Smart Grids: Security and Privacy Issues (Hardcover, 1st ed. 2017)
Kianoosh G. Boroojeni, M. Hadi Amini, S.S. Iyengar
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.

Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.): Shafiullah Khan, Al-Sakib Khan... Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.)
Shafiullah Khan, Al-Sakib Khan Pathan
R6,319 R4,906 Discovery Miles 49 060 Save R1,413 (22%) Ships in 12 - 17 working days

"Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.

Smart Device to Smart Device Communication (Hardcover, 2014): Shahid Mumtaz, Jonathan Rodriguez Smart Device to Smart Device Communication (Hardcover, 2014)
Shahid Mumtaz, Jonathan Rodriguez
R3,401 Discovery Miles 34 010 Ships in 12 - 17 working days

This book presents a comprehensive analysis of D2D communication over LTE-A band. The book uses 3GPP LTE-A as a baseline and explains all fundamental requirements for deploying D2D network under cellular systems from an architectural, technical and business point of view. The contributors explain the standardization activities of Release 12 of LTE-A, which has been recently acknowledged as support of D2D communication in LTE-A. The text updates the research community on the D2D roadmap as well as new features emerging for consideration in 3GPP.

Cyberterrorism - Understanding, Assessment, and Response (Hardcover, 2014 ed.): Thomas M. Chen, Lee Jarvis, Stuart MacDonald Cyberterrorism - Understanding, Assessment, and Response (Hardcover, 2014 ed.)
Thomas M. Chen, Lee Jarvis, Stuart MacDonald
R2,991 Discovery Miles 29 910 Ships in 12 - 17 working days

This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.

Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011): Ling Dong, Kefei Chen Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011)
Ling Dong, Kefei Chen
R4,599 Discovery Miles 45 990 Ships in 12 - 17 working days

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism s efficiency, rigorousness, and the possibility of its automation are also presented.
The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.
Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.

Consumers Guide to Cell Phones and Wireless Service Plans (Paperback): Syngress Consumers Guide to Cell Phones and Wireless Service Plans (Paperback)
Syngress
R609 Discovery Miles 6 090 Ships in 12 - 17 working days

Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive
Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming to think of the options available to the consumer when it comes to buying mobile phones, phone accessories, and service plans. So many people are confused by the myriad of wireless phone claims, the endless advertised rates and the countless service plans with all their options. The Consumer's Guide to Cell Phones is designed to help consumers choose what program may best suit them. This book helps streamline the wireless-buying process by providing a complete listing of all wireless providers and the details of their plans.
International listings cover USA, Africa, Asia-Pacific, Australia, Europe, Latin America, and the Middle East. As an example, in Ireland there is coverage of Digiphone and other plans, in Australia of Telstra, in the UK Cellnet, Orange, etc.
The companion web site for the book includes a service provider database
As the mobile market continues to grow more people are looking to use their phone for fax, e-mail or mobile computing - this book has the answers

RFID Security (Paperback): Frank Thornton, Chris Lanthem RFID Security (Paperback)
Frank Thornton, Chris Lanthem
R1,460 Discovery Miles 14 600 Ships in 12 - 17 working days

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books.
RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.
Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .
* Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005
* Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information
* Little competition in a market desperate for information

Quality of Communication-Based Systems - Proceedings of an International Workshop Held at the TU, Berlin, Germany, September... Quality of Communication-Based Systems - Proceedings of an International Workshop Held at the TU, Berlin, Germany, September 1994 (Hardcover, illustrated edition)
Gunter Hommel
R3,044 Discovery Miles 30 440 Ships in 10 - 15 working days

This work presents the research results of students of the Graduiertenkolleg "Communication-Based Systems" to an international community. To stimulate the scientific discussion, experts have been invited to give their views on the following research areas: formal specification and mathematical foundations of distributed systems using process algebra, graph transformations, process calculi and temporal logics; performance evaluation, dependability modelling and analysis of real-time systems with different kinds of timed Petri-nets; specification and analysis of communication protocols; reliability, security and dependability in distributed systems; object orientation in distributed systems architecture; software development and concepts for distributed applications; computer network architecture and management; and language concepts for distributed systems.

Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca,... Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 (Hardcover, 2008 ed.)
Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
R2,804 Discovery Miles 28 040 Ships in 10 - 15 working days

This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. Aside the adoption of Internet as the global network infrastructure these last years have shown the growing of a set of new network architectures without a rigid and known a priori architecture using wireless techniques, like sensor and ad-hoc networks. These new types of networks are opening the possibility to create a large number of new applications ranging from domestic to nature surveying. These new networks are generating new technical challenges like the capability of auto-reconfiguration in order to give the network an optimal configuration, the energy saving need when the nodes have not a source of energy other than a small battery, new protocols to access the network and to convey the information across the network when its structure is not completely known or should be discovered, new paradigms for keeping the needed information security and privacy in a quite uncontrolled environment, and others.

Partitional Clustering Algorithms (Hardcover, 2015 ed.): M. Emre Celebi Partitional Clustering Algorithms (Hardcover, 2015 ed.)
M. Emre Celebi
R4,302 R3,581 Discovery Miles 35 810 Save R721 (17%) Ships in 12 - 17 working days

This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.

Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.): Nikolaos P. Preve Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.)
Nikolaos P. Preve
R4,268 Discovery Miles 42 680 Ships in 10 - 15 working days

This book presents research from many of the major projects involved in the emerging global grid infrastructure. With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs. Topics: examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures; describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks; investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems; explores job control using service-level agreements; introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix; discusses the PhyloGrid application, and a numerical simulation performed using grid computing.

Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS... Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS 2009, Langenargen, Germany, September 14-16, 2009, Proceedings (Hardcover, 2009 ed.)
Achim Rettberg, Mauro C. Zanella, Michael Amann, Michael Keckeisen, Franz J. Rammig
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

This book presents the technical program of the International Embedded Systems Symposium (IESS) 2009. Timely topics, techniques and trends in embedded system design are covered by the chapters in this volume, including modelling, simulation, verification, test, scheduling, platforms and processors. Particular emphasis is paid to automotive systems and wireless sensor networks. Sets of actual case studies in the area of embedded system design are also included. Over recent years, embedded systems have gained an enormous amount of proce- ing power and functionality and now enter numerous application areas, due to the fact that many of the formerly external components can now be integrated into a single System-on-Chip. This tendency has resulted in a dramatic reduction in the size and cost of embedded systems. As a unique technology, the design of embedded systems is an essential element of many innovations. Embedded systems meet their performance goals, including real-time constraints, through a combination of special-purpose hardware and software components tailored to the system requirements. Both the development of new features and the reuse of existing intellectual property components are essential to keeping up with ever more demanding customer requirements. Furthermore, design complexities are steadily growing with an increasing number of components that have to cooperate properly. Embedded system designers have to cope with multiple goals and constraints simul- neously, including timing, power, reliability, dependability, maintenance, packaging and, last but not least, price.

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,375 Discovery Miles 13 750 Ships in 12 - 17 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

AWS Database Migration Service User Guide (Hardcover): Documentation Team AWS Database Migration Service User Guide (Hardcover)
Documentation Team
R1,250 Discovery Miles 12 500 Ships in 10 - 15 working days
Information Technology in Environmental Engineering - Proceedings of the 7th International Conference on Information... Information Technology in Environmental Engineering - Proceedings of the 7th International Conference on Information Technologies in Environmental Engineering (ITEE 2015) (Hardcover, 1st ed. 2016)
Jorge Marx Gomez, Brenda Scholtz
R3,674 R3,234 Discovery Miles 32 340 Save R440 (12%) Ships in 12 - 17 working days

This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering. The book has three main focus areas: firstly, it shows how information technologies can be employed to support natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Secondly, it demonstrates the application of computing in the everyday practices of environmental engineers, natural scientists, economists and social scientists. And thirdly, it demonstrates how the complexity of natural phenomena can be approached using interdisciplinary methods, where computer science offers the infrastructure needed for environmental data collection and management, scientific simulations, decision support documentation and reporting.The book collects selected papers presented at the 7th International Symposium on Environmental Engineering, held in Port Elizabeth, South Africa in July 2015. It discusses recent success stories in eco-informatics, promising ideas and new challenges from the interdisciplinary viewpoints of computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem-solving and decision-making.

Current and Emerging Trends in Cyber Operations - Policy, Strategy and Practice (Hardcover, 1st ed. 2015): Frederic Lemieux Current and Emerging Trends in Cyber Operations - Policy, Strategy and Practice (Hardcover, 1st ed. 2015)
Frederic Lemieux
R3,919 Discovery Miles 39 190 Ships in 12 - 17 working days

This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.

Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover)
Information Reso Management Association
R10,388 Discovery Miles 103 880 Ships in 10 - 15 working days
Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services... Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services (Paperback)
P Abdoulaye
R687 Discovery Miles 6 870 Ships in 12 - 17 working days

Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R8,172 Discovery Miles 81 720 Ships in 12 - 17 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Intrusion Prevention and Active Response - Deploying Network and Host IPS (Paperback): Michael Rash, Angela Orebaugh, Graham... Intrusion Prevention and Active Response - Deploying Network and Host IPS (Paperback)
Michael Rash, Angela Orebaugh, Graham Clark
R1,482 Discovery Miles 14 820 Ships in 12 - 17 working days

This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
* Corporate spending for Intrusion Prevention systems increased dramatically by 11% in the last quarter of 2004 alone
* Lead author, Michael Rash, is well respected in the IPS Community, having authored FWSnort, which greatly enhances the intrusion prevention capabilities of the market-leading Snort IDS

ICT Innovations 2009 (Hardcover, 2010 ed.): Danco Davcev, Jorge Marx Gomez ICT Innovations 2009 (Hardcover, 2010 ed.)
Danco Davcev, Jorge Marx Gomez
R5,706 Discovery Miles 57 060 Ships in 10 - 15 working days

This book is the result of the first International Conference ICT Innovations 2009. The ICT Innovations conference is the primary scientific action of the Macedonian Society on Information and Communication Technologies (ICT-ACT). It promotes the publication of scientific results of the international community related to innovative fundamental and applied research in ICT. Today, ICT has enlarged its horizons and it is practiced under multidisciplinary contexts that introduce new challenges to theore- cal and technical approaches. The ICT Innovations 2009 conference gathered academics, professionals and pr- titioners reporting their valuable experiences in developing solutions and systems in the industrial and business arena especially innovative commercial implementations, novel applications of technology, and experience in applying recent research advances to practical situations, in any ICT areas. The conference focuses on issues concerning a variety of ICT fields like: * Multimedia Information Systems * Artificial Intelligence * Pervasive and Ubiquitous Computing * Eco and Bio Informatics * Internet and Web Applications and Services * Wireless and Mobile Communications and Services * Computer Networks, Security and Cryptography * Distributed Systems, GRID and Cloud Computing ICT Innovations 2009 Conference was held in Ohrid, Macedonia, in September 28-30, 2009. Local arrangements provided by the members of the Macedonian Society on Information and Communication Technologies - ICT-ACT, mainly consisting of teaching and research staff of Computer Science Department at Faculty of Electrical Engineering and Information Technologies and Institute of Informatics at Faculty of Natural Sciences, both at Ss. Cyril and Methodius University in Skopje, Macedonia.

Handbook of Vascular Biometrics (Hardcover, 1st ed. 2020): Andreas Uhl, Christoph Busch, Sebastien Marcel, Raymond Veldhuis Handbook of Vascular Biometrics (Hardcover, 1st ed. 2020)
Andreas Uhl, Christoph Busch, Sebastien Marcel, Raymond Veldhuis
R1,576 Discovery Miles 15 760 Ships in 12 - 17 working days

This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.

Content Delivery Networks (Hardcover, 2008 ed.): Rajkumar Buyya, Mukaddim Pathan, Athena Vakali Content Delivery Networks (Hardcover, 2008 ed.)
Rajkumar Buyya, Mukaddim Pathan, Athena Vakali
R6,218 Discovery Miles 62 180 Ships in 10 - 15 working days

"Content Delivery Networks" enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.

Advances in Research Methods for Information Systems Research - Data Mining, Data Envelopment Analysis, Value Focused Thinking... Advances in Research Methods for Information Systems Research - Data Mining, Data Envelopment Analysis, Value Focused Thinking (Hardcover, 2014 ed.)
Kweku-Muata Osei-Bryson, Ojelanki Ngwenyama
R3,311 Discovery Miles 33 110 Ships in 12 - 17 working days

Advances in social science research methodologies and data analytic methods are changing the way research in information systems is conducted. New developments in statistical software technologies for data mining (DM) such as regression splines or decision tree induction can be used to assist researchers in systematic post-positivist theory testing and development. Established management science techniques like data envelopment analysis (DEA), and value focused thinking (VFT) can be used in combination with traditional statistical analysis and data mining techniques to more effectively explore behavioral questions in information systems research. As adoption and use of these research methods expand, there is growing need for a resource book to assist doctoral students and advanced researchers in understanding their potential to contribute to a broad range of research problems.

"Advances in Research Methods for Information Systems Research: Data Mining, Data Envelopment Analysis, Value Focused Thinking" focuses on bridging and unifying these three different methodologies in order to bring them together in a unified volume for the information systems community. This book serves as a resource that provides overviews on each method, as well as applications on how they can be employed to address IS research problems. Its goal is to help researchers in their continuous efforts to set the pace for having an appropriate interplay between behavioral research and design science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Anti-Money Laundering Regulation and…
Alexander Dill Paperback R2,105 Discovery Miles 21 050
Information Exchange Between Competitors…
Martin Gassler Hardcover R3,481 Discovery Miles 34 810
Tax Law: An Introduction
Annet Wanyana Oguttu, Elzette Muller, … Paperback R1,291 Discovery Miles 12 910
Governance and Sustainability…
David Crowther, Shahla Seifi Hardcover R4,258 Discovery Miles 42 580
The UN Guiding Principles on Business…
Barnali Choudhury Hardcover R4,593 Discovery Miles 45 930
Strategies for Minimizing Risk Under the…
Mike Koehler Hardcover R3,578 Discovery Miles 35 780
Hockly's Insolvency Law Casebook
R. Sharrock, L.S. Steyn, … Paperback R864 R752 Discovery Miles 7 520
EU External Action in International…
Mads Andenas, Luca Pantaleo, … Hardcover R4,595 Discovery Miles 45 950
Case Book on the Law of Partnership…
A. Loubser Paperback R702 R618 Discovery Miles 6 180
Start-up Law
Alexandra Andhov Paperback R2,192 Discovery Miles 21 920

 

Partners