0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (319)
  • R250 - R500 (928)
  • R500+ (16,361)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computer Privacy Annoyances (Paperback): Dan Tynan Computer Privacy Annoyances (Paperback)
Dan Tynan
R240 R208 Discovery Miles 2 080 Save R32 (13%) Out of stock

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. "Computer Privacy Annoyances" shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. "Computer Privacy Annoyances" is your guide to a safer, saner, and more private life.

Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, "Computer Privacy Annoyances" serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more.

The key areas covered include:

Privacy at Home

Privacy on the Net

Privacy at Work

Privacy in Public

Privacy and Uncle Sam

Privacy in the Future

Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at "PC World," Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.

Well-Grounded Java Developer, The (Paperback, 2nd edition): Benjamin Evans, Jason Clark, Martijn Verburg Well-Grounded Java Developer, The (Paperback, 2nd edition)
Benjamin Evans, Jason Clark, Martijn Verburg
R1,305 Discovery Miles 13 050 Ships in 12 - 17 working days

Understanding Java from the JVM up gives you a solid foundation to grow your expertise and take on advanced techniques for performance, concurrency, containerization, and more. In The Well-Grounded Java Developer, Second Edition you will learn: The new Java module system and why you should use it Bytecode for the JVM, including operations and classloading Performance tuning the JVM Working with Java's built-in concurrency and expanded options Programming in Kotlin and Clojure on the JVM Maximizing the benefits from your build/CI tooling with Maven and Gradle Running the JVM in containers Planning for future JVM releases The Well-Grounded Java Developer, Second Edition introduces both the modern innovations and timeless fundamentals you need to know to become a Java master. Authors Ben Evans, Martijn Verburg, and Jason Clark distil their decades of experience as Java Champions, veteran developers, and key contributors to the Java ecosystem into this clear and practical guide. about the technology Java's history of innovation, its huge collection of libraries and frameworks, and the flexibility of the JVM have cemented its place as one of the world's most popular programming languages. Although it's easy to get started with Java, understanding how the language intersects with the JVM is the key to unlocking the power of this awesome language and its deep ecosystem of frameworks, tools, and alternative JVM-based languages. about the book The Well-Grounded Java Developer, Second Edition is a complete revision of the classic original with the latest innovations of the Java platform. It upgrades your existing Java skills with both JVM fundamentals like bytecode, and powerful new features such as modules and concurrency models. You'll broaden your understanding of what's possible by exploring Kotlin and other JVM languages, and learn how functional programming can offer a powerful new perspective. Each concept is illustrated with hands-on examples, including a fully modularized application/library, build setups for Maven and Gradle, and creating your own multithreaded application.

Microsoft (R) Outlook 2010 - Text (Paperback): Denise Seguin Microsoft (R) Outlook 2010 - Text (Paperback)
Denise Seguin
R2,674 R2,311 Discovery Miles 23 110 Save R363 (14%) Out of stock

Microsoft Outlook 2010 teaches students the functionality and features of the Outlook application. The text emphasizes skills of researching, sharing, and transferring information as criteria to succeeding in a knowledge-based economy. * Clear instruction and step-by-step exercises correlated with screen visuals. * Quick Steps feature summaries in page margins. * Comprehensive chapter assessments that require concepts recall and skills application.

Industrial Wireless Sensor Networks - Applications, Protocols, and Standards (Paperback): Gerhard P Hancke, V. Cagri Gungoer Industrial Wireless Sensor Networks - Applications, Protocols, and Standards (Paperback)
Gerhard P Hancke, V. Cagri Gungoer
R2,423 Discovery Miles 24 230 Ships in 12 - 17 working days

The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outlines future directions for research. What Are the Main Challenges in Developing IWSN Systems? Featuring contributions by researchers around the world, this book explores the software and hardware platforms, protocols, and standards that are needed to address the unique challenges posed by IWSN systems. It offers an in-depth review of emerging and already deployed IWSN applications and technologies, and outlines technical issues and design objectives. In particular, the book covers radio technologies, energy harvesting techniques, and network and resource management. It also discusses issues critical to industrial applications, such as latency, fault tolerance, synchronization, real-time constraints, network security, and cross-layer design. A chapter on standards highlights the need for specific wireless communication standards for industrial applications. A Starting Point for Further Research Delving into wireless sensor networks from an industrial perspective, this comprehensive work provides readers with a better understanding of the potential advantages and research challenges of IWSN applications. A contemporary reference for anyone working at the cutting edge of industrial automation, communication systems, and networks, it will inspire further exploration in this promising research area.

Digital Forensics Explained (Hardcover, 2nd edition): Greg Gogolin Digital Forensics Explained (Hardcover, 2nd edition)
Greg Gogolin
R3,998 Discovery Miles 39 980 Ships in 12 - 17 working days

This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives. Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations. The book is a valuable resource for the academic environment, law enforcement, those in the legal profession, and those working in the cyber security field. Case reviews include cyber security breaches, anti-forensic challenges, child exploitation, and social media investigations. Greg Gogolin, PhD, CISSP, is a Professor of Information Security and Intelligence at Ferris State University and a licensed Professional Investigator. He has worked more than 100 cases in criminal, civil, and corporate environments.

CyRM - Mastering the Management of Cybersecurity (Hardcover): David X. Martin CyRM - Mastering the Management of Cybersecurity (Hardcover)
David X. Martin
R1,883 Discovery Miles 18 830 Ships in 12 - 17 working days

Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.

Cloud Reliability Engineering - Technologies and Tools (Hardcover): Rathnakar Achary, Pethuru Raj Cloud Reliability Engineering - Technologies and Tools (Hardcover)
Rathnakar Achary, Pethuru Raj
R3,265 Discovery Miles 32 650 Ships in 12 - 17 working days

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Outsourcing Technical Communication - Issues, Policies and Practices (Paperback): Barry Thatcher, Carlos Evia Outsourcing Technical Communication - Issues, Policies and Practices (Paperback)
Barry Thatcher, Carlos Evia
R1,432 Discovery Miles 14 320 Ships in 12 - 17 working days

This book examines the impact of outsourcing on the field of technical communication. Aided by new technologies and driven by global market structures, technical communication products that were once developed in the United States or Western Europe are now being developed in Asia, Eastern Europe, and other parts of the world. If technical communication follows other fields, such as information technologies, electronics manufacturing, and even textiles, this 'outsourcing' of technical communication products and jobs will surely influence our profession-but how? What kinds of jobs will remain in the United States? Which jobs are more efficiently handled outside the United States? How can U.S. technical communicators develop a 'comparative advantage' in the global economy? How can collaboration and joint development of information products be managed? What are the ethical, cultural, social, and economic dilemmas created by outsourcing?This collection is designed as a theory/practice book that addresses the needs of graduate students, faculty, and technical communicators who want to teach, practice, or conduct research in this area. It addresses technical communications and outsourcing in six different parts of the world, including the United States. It also explores issues of curriculum, project management, legal considerations, and intercultural communication problems.This title is suitable for: Technical communication professionals in academia and industry; managers, researchers, and teachers of documentation projects who are involved in offshore outsourcing situations and need to find best practices, strategies, or recommendations for being successful; technical writers (freelancers and corporate employees) working with international partners interested in how outsourcing can affect the future of their profession; non-U.S. writers working in outsourcing projects looking to perform satisfactorily in their jobs; undergraduate and graduate professors in universities and community colleges teaching courses in publications management, information design, international communication, and technical writing, and students enrolled in those courses; teachers and students in rhetorical theory and professional communication pedagogy courses; ESL (English as a second language) and ESP (English for specific purposes) readers.

Spatial Cloud Computing - A Practical Approach (Paperback): Chaowei Yang, Qunying Huang Spatial Cloud Computing - A Practical Approach (Paperback)
Chaowei Yang, Qunying Huang
R1,818 Discovery Miles 18 180 Ships in 12 - 17 working days

An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience. Using practical examples, it details the geoscience requirements of cloud computing, covers general procedures and considerations when migrating geoscience applications onto cloud services, and demonstrates how to deploy different applications. The book discusses how to choose cloud services based on the general cloud computing measurement criteria and cloud computing cost models. The authors examine the readiness of cloud computing to support geoscience applications using open source cloud software solutions and commercial cloud services. They then review future research and developments in data, computation, concurrency, and spatiotemporal intensities of geosciences and how cloud service can be leveraged to meet the challenges. They also introduce research directions from the aspects of technology, vision, and social dimensions. Spatial Cloud Computing: A Practical Approach a common workflow for deploying geoscience applications and provides references to the concepts, technical details, and operational guidelines of cloud computing. These features and more give developers, geoscientists, and IT professionals the information required to make decisions about how to select and deploy cloud services.

Cooperative Control of Multi-Agent Systems - A Consensus Region Approach (Paperback): Zhong-Kui Li, Zhisheng Duan Cooperative Control of Multi-Agent Systems - A Consensus Region Approach (Paperback)
Zhong-Kui Li, Zhisheng Duan
R2,491 Discovery Miles 24 910 Ships in 12 - 17 working days

Distributed controller design is generally a challenging task, especially for multi-agent systems with complex dynamics, due to the interconnected effect of the agent dynamics, the interaction graph among agents, and the cooperative control laws. Cooperative Control of Multi-Agent Systems: A Consensus Region Approach offers a systematic framework for designing distributed controllers for multi-agent systems with general linear agent dynamics, linear agent dynamics with uncertainties, and Lipschitz nonlinear agent dynamics. Beginning with an introduction to cooperative control and graph theory, this monograph: Explores the consensus control problem for continuous-time and discrete-time linear multi-agent systems Studies the H and H2 consensus problems for linear multi-agent systems subject to external disturbances Designs distributed adaptive consensus protocols for continuous-time linear multi-agent systems Considers the distributed tracking control problem for linear multi-agent systems with a leader of nonzero control input Examines the distributed containment control problem for the case with multiple leaders Covers the robust cooperative control problem for multi-agent systems with linear nominal agent dynamics subject to heterogeneous matching uncertainties Discusses the global consensus problem for Lipschitz nonlinear multi-agent systems Cooperative Control of Multi-Agent Systems: A Consensus Region Approach provides a novel approach to designing distributed cooperative protocols for multi-agent systems with complex dynamics. The proposed consensus region decouples the design of the feedback gain matrices of the cooperative protocols from the communication graph and serves as a measure for the robustness of the protocols to variations of the communication graph. By exploiting the decoupling feature, adaptive cooperative protocols are presented that can be designed and implemented in a fully distributed fashion.

Knowledge Service Engineering Handbook (Paperback): Jussi Kantola, Waldemar Karwowski Knowledge Service Engineering Handbook (Paperback)
Jussi Kantola, Waldemar Karwowski
R1,853 Discovery Miles 18 530 Ships in 12 - 17 working days

Edited by Jussi Kantola, the founding faculty member of the world's first university Knowledge Service Engineering Department at Korea Advanced Institute of Science and Technology, and Waldemar Karwowski from the Department of Industrial Engineering and Management Systems at UCF, Knowledge Service Engineering Handbook defines what knowledge services engineering means and how it is different from service engineering and service production. This groundbreaking handbook explores recent advances in knowledge service engineering from the accomplished researchers and practitioners in this field from around the world and provides engineering, systemic, industry, and consumer use viewpoints to knowledge service systems and engineering paradigms. The handbook outlines how to acquire and utilize knowledge in the 21st century presenting multiple cultural aspects including US, European, and Asian perspectives. Organized into four parts, it begins with an introduction to the main concepts of knowledge services. It then explores data, information and knowledge based engineering methods and applications that can be used to develop knowledge services, followed by discussions of the importance of human networks in knowledge services. The handbook concludes with descriptions of high-performance knowledge service systems. This structure allows different uses: the information can be looked up as needed or read in the order presented. As with any new field, the excitement lies in seeing how to combine these advances in data, information, and human parts of knowledge services in the future. While most books on this subject concentrate on data, information, or knowledge, this handbook integrates coverage of all three, thus providing a complete examination of sustainable knowledge services. The handbook has been carefully designed to be of use to professionals who develop new knowledge services and related businesses, for academic researchers and lecturers to start new research projects, and for students studying knowledge services, knowledge service production, and knowledge service business.

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
KD Mitnick
R378 R259 Discovery Miles 2 590 Save R119 (31%) Ships in 12 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Advances in Computer Communications and Networks From Green, Mobile, Pervasive Networking to Big Data Computing (Hardcover):... Advances in Computer Communications and Networks From Green, Mobile, Pervasive Networking to Big Data Computing (Hardcover)
Kewei Sha, Aaron Striegel, Min Song
R2,538 Discovery Miles 25 380 Ships in 12 - 17 working days

Recent developments in computer communications and networks have enabled the deployment of exciting new areas such as Internet of Things and collaborative big data analysis. The design and implementation of energy efficient future generation communication and networking technologies also require the clever research and development of mobile, pervasive, and large-scale computing technologies. Advances in Computer Communications and Networks: from Green, Mobile, Pervasive Networking to Big Data Computing studies and presents recent advances in communication and networking technologies reflecting the state-of-the-art research achievements in novel communication technology and network optimization. Technical topics discussed in the book include: Data Center Networks Mobile Ad Hoc Networks Multimedia Networks Internet of Things Wireless Spectrum Network Optimization. This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, electrical engineering and telecommunication systems.

Security, Privacy and Reliability in Computer Communications and Networks (Hardcover): Kewei Sha, Aaron Striegel, Min Song Security, Privacy and Reliability in Computer Communications and Networks (Hardcover)
Kewei Sha, Aaron Striegel, Min Song
R2,514 Discovery Miles 25 140 Ships in 12 - 17 working days

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion Detection Cryptographic Algorithms and Evaluation Privacy Reliable Routing Protocols This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.

Cellular Network Planning (Hardcover): Marcelo Sampaio De Alencar, Djalma De Melo Carvalho Filho Cellular Network Planning (Hardcover)
Marcelo Sampaio De Alencar, Djalma De Melo Carvalho Filho
R2,851 R2,340 Discovery Miles 23 400 Save R511 (18%) Ships in 12 - 17 working days

Over the recent years, few books have been published covering all the subjects needed to understand the very fundamental concepts of cell planning. Most books which deal with this topic are destined to very specific audiences, and the vast majority introduce the subject at a very basic, or technical, level, or are destined to an academic audience. Cellular Network Planning begins with an introduction to the subject, covering conventional and contemporary wireless systems. Spectral allocation and the frequency plan are discussed, along with the essential characteristics of wireless systems. The design of mobile cellular systems includes cell planning, traffic and channel problems. The book presents a review of existing models, considering both green field dimensioning and network expansion strategies, and discusses multi-objective optimization and base station deployment based on artificial immune systems. It also discusses a cost-effective base station deployment approach based on artificial immune systems, and introduces the modified MO-AIS algorithm. Technical topics discussed in the book include: - Mobile Cellular Network Basics - Evolution of Mobile Cellular System - The Mobile Communications Channel - Propagation Models - Cell Planning - Green Field Dimensioning - Network Expansion - Cost-effective Planning Strategies

Multimedia Security - Watermarking, Steganography, and Forensics (Paperback): Frank Y. Shih Multimedia Security - Watermarking, Steganography, and Forensics (Paperback)
Frank Y. Shih
R2,515 Discovery Miles 25 150 Ships in 12 - 17 working days

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

Mathematical Foundations for Signal Processing, Communications, and Networking (Paperback): Erchin Serpedin, Thomas Chen,... Mathematical Foundations for Signal Processing, Communications, and Networking (Paperback)
Erchin Serpedin, Thomas Chen, Dinesh Rajan
R2,581 Discovery Miles 25 810 Ships in 12 - 17 working days

Mathematical Foundations for Signal Processing, Communications, and Networking describes mathematical concepts and results important in the design, analysis, and optimization of signal processing algorithms, modern communication systems, and networks. Helping readers master key techniques and comprehend the current research literature, the book offers a comprehensive overview of methods and applications from linear algebra, numerical analysis, statistics, probability, stochastic processes, and optimization. From basic transforms to Monte Carlo simulation to linear programming, the text covers a broad range of mathematical techniques essential to understanding the concepts and results in signal processing, telecommunications, and networking. Along with discussing mathematical theory, each self-contained chapter presents examples that illustrate the use of various mathematical concepts to solve different applications. Each chapter also includes a set of homework exercises and readings for additional study. This text helps readers understand fundamental and advanced results as well as recent research trends in the interrelated fields of signal processing, telecommunications, and networking. It provides all the necessary mathematical background to prepare students for more advanced courses and train specialists working in these areas.

Developing Windows-Based and Web-Enabled Information Systems (Paperback): Nong Ye, Teresa Wu Developing Windows-Based and Web-Enabled Information Systems (Paperback)
Nong Ye, Teresa Wu
R1,901 Discovery Miles 19 010 Ships in 12 - 17 working days

Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity-relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components. The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don't have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.

Distributed Data Fusion for Network-Centric Operations (Paperback): Chee-Yee Chong, James Llinas, David Hall, Martin Liggins II Distributed Data Fusion for Network-Centric Operations (Paperback)
Chee-Yee Chong, James Llinas, David Hall, Martin Liggins II
R2,527 Discovery Miles 25 270 Ships in 12 - 17 working days

With the recent proliferation of service-oriented architectures (SOA), cloud computing technologies, and distributed-interconnected systems, distributed fusion is taking on a larger role in a variety of applications-from environmental monitoring and crisis management to intelligent buildings and defense. Drawing on the work of leading experts around the world, Distributed Data Fusion for Network-Centric Operations examines the state of the art of data fusion in a distributed sensing, communications, and computing environment. Get Insight into Designing and Implementing Data Fusion in a Distributed Network Addressing the entirety of information fusion, the contributors cover everything from signal and image processing, through estimation, to situation awareness. In particular, the work offers a timely look at the issues and solutions involving fusion within a distributed network enterprise. These include critical design problems, such as how to maintain a pedigree of agents or nodes that receive information, provide their contribution to the dataset, and pass to other network components. The book also tackles dynamic data sharing within a network-centric enterprise, distributed fusion effects on state estimation, graph-theoretic methods to optimize fusion performance, human engineering factors, and computer ontologies for higher levels of situation assessment. A comprehensive introduction to this emerging field and its challenges, the book explores how data fusion can be used within grid, distributed, and cloud computing architectures. Bringing together both theoretical and applied research perspectives, this is a valuable reference for fusion researchers and practitioners. It offers guidance and insight for those working on the complex issues of designing and implementing distributed, decentralized information fusion.

Internet of Drones - Applications, Opportunities, and Challenges (Hardcover): Saravanan Krishnan, M. Murugappan Internet of Drones - Applications, Opportunities, and Challenges (Hardcover)
Saravanan Krishnan, M. Murugappan
R3,754 Discovery Miles 37 540 Ships in 9 - 15 working days

Focusses on important perspectives of the Internet of Drones (IoD) Emphasizes drone deployment in smart cities, smart agriculture, smart healthcare, and 3D mapping Covers challenges in drone design for applications with security and privacy issues Reviews diversified drone applications with real-use cases from modern drone players ranging from startup companies to big giants in the drone industry Includes different aspects of drone design such as hardware and software architecture, potential applications, and opportunities

Hands on Virtual Computing (Paperback, 2nd edition): Ted Simpson, Jason Novak Hands on Virtual Computing (Paperback, 2nd edition)
Ted Simpson, Jason Novak
R1,340 R1,198 Discovery Miles 11 980 Save R142 (11%) Ships in 10 - 15 working days

Prepare for today's dramatically changing IT world with the insights and timely instruction in HANDS-ON VIRTUAL COMPUTING, 2E. This unique book combines current theory and emerging concepts with practical hands-on activities and projects to help you master virtualization and learn to apply those skills in real world scenarios. You gain experience working with the latest virtualization technology and learn the differences between the two major leaders in virtualization products -- VMware and Microsoft. Specific chapters address Oracle VirtualBox, VMware Workstation, Microsoft Hyper-V, VMware vSphere, and virtualization in software-defined data centers. You develop the solid understanding of virtualization concepts and products that you need to advance within your IT career.

Ecosystems and Technology - Idea Generation and Content Model Processing (Paperback): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Paperback)
Cyrus F Nourani
R2,584 Discovery Miles 25 840 Ships in 12 - 17 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Business Process Reengineering - An ICT Approach (Paperback): Heru Susanto, Fang-Yie Leu, Chin Kang Chen Business Process Reengineering - An ICT Approach (Paperback)
Heru Susanto, Fang-Yie Leu, Chin Kang Chen
R2,579 Discovery Miles 25 790 Ships in 12 - 17 working days

This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.

Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing (Hardcover): Leando Soares Indrusiak, Piotr... Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing (Hardcover)
Leando Soares Indrusiak, Piotr Dziurzanski, Amit Kumar Singh
R2,158 Discovery Miles 21 580 Ships in 12 - 17 working days

The availability of many-core computing platforms enables a wide variety of technical solutions for systems across the embedded, high-performance and cloud computing domains. However, large scale manycore systems are notoriously hard to optimise. Choices regarding resource allocation alone can account for wide variability in timeliness and energy dissipation (up to several orders of magnitude). Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency. It addresses different types of systems, aiming to harmonise the approaches to dynamic allocation across the complete spectrum between systems with little flexibility and strict real-time guarantees all the way to highly dynamic systems with soft performance requirements. Technical topics presented in the book include: * Load and Resource Models* Admission Control* Feedback-based Allocation and Optimisation* Search-based Allocation Heuristics* Distributed Allocation based on Swarm Intelligence* Value-Based AllocationEach of the topics is illustrated with examples based on realistic computational platforms such as Network-on-Chip manycore processors, grids and private cloud environments.

New infotainment Technologies in the Home - Demand-side Perspectives (Paperback): Ruby Roy Dholakia, Norbert Mundorf, Nikhilesh... New infotainment Technologies in the Home - Demand-side Perspectives (Paperback)
Ruby Roy Dholakia, Norbert Mundorf, Nikhilesh Dholakia
R1,510 Discovery Miles 15 100 Ships in 12 - 17 working days

As the "information superhighway" moves into the home through interactive media, enhanced telecom services, and hybrid appliances, interest continually grows in how consumers adopt and use Information Technology (IT), the strategies IT marketers use to reach consumers, and the public policies that help and protect consumers. USE COPY FROM THIS POINT ON FOR GENERAL CATALOGS... This book presents a unique collection of papers dealing with the demand side issues of new information technologies in the home. The contributors are from business, academia, and the public policy sector and represent many disciplines including communication, marketing, economics, psychology, engineering, and information systems. This book provides one of the best introductions to complex issues such as: * business forces that will shape "Home IT" of the future; * industry structure of the future "Infotainment" mega-business; * factors affecting consumer adoption and use of IT; * international differences in the management of the IT sector; and * public policies that will shape the deployment and use of IT.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,347 Discovery Miles 13 470
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R458 Discovery Miles 4 580
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,271 Discovery Miles 12 710
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R913 Discovery Miles 9 130
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Cloud Security For Dummies
T. Coombs Paperback R641 Discovery Miles 6 410
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430

 

Partners