0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (273)
  • R250 - R500 (876)
  • R500+ (13,595)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Mobile Data Communication Systems (Hardcover): Peter Wong, David Britland Mobile Data Communication Systems (Hardcover)
Peter Wong, David Britland
R2,135 Discovery Miles 21 350 Ships in 18 - 22 working days

Brings you up to speed on mobile data system design, current and emerging wireless network and systems standards, and network architectures. Describes mobile data applications and wireless LANs, and analyzes and evaluates current technologies.

Justifying the Dependability of Computer-based Systems - With Applications in Nuclear Engineering (Hardcover, 2008 ed.):... Justifying the Dependability of Computer-based Systems - With Applications in Nuclear Engineering (Hardcover, 2008 ed.)
Pierre-Jacques Courtois
R5,185 Discovery Miles 51 850 Ships in 18 - 22 working days

Safety is a paradoxical system property. It remains immaterial, intangible and invisible until a failure, an accident or a catastrophy occurs and, too late, reveals its absence. And yet, a system cannot be relied upon unless its safety can be explained, demonstrated and certified. The practical and difficult questions which motivate this study concern the evidence and the arguments needed to justify the safety of a computer based system, or more generally its dependability. Dependability is a broad concept integrating properties such as safety, reliability, availability, maintainability and other related characteristics of the behaviour of a system in operation. How can we give the users the assurance that the system enjoys the required dependability? How should evidence be presented to certification bodies or regulatory authorities? What best practices should be applied? How should we decide whether there is enough evidence to justify the release of the system? To help answer these daunting questions, a method and a framework are proposed for the justification of the dependability of a computer-based system. The approach specifically aims at dealing with the difficulties raised by the validation of software. Hence, it should be of wide applicability despite being mainly based on the experience of assessing Nuclear Power Plant instrumentation and control systems important to safety. To be viable, a method must rest on a sound theoretical background.

Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of... Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of Heuristics (Hardcover, Reprinted from JOURNAL OF HEURISTICS, 6:1, 2000)
Robert Doverspike, Iraj Saniee
R2,746 Discovery Miles 27 460 Ships in 18 - 22 working days

The telecommunications industry is experiencing a worldwide explosion of growth as few other industries ever have. However, as recently as a decade ago, the bulk of telecommunications services were delivered by the traditional telephone network, for which design and analysis principles had been under steady development for over three-quarters of a century. This environment was characterized by moderate and steady growth, with an accompanying slower development of new network equipment and standardization processes. In such a near-static environment, attention was given to optimization techniques to squeeze out better profits from existing and limited future investments. To this end, forecasts of network services were developed on a regular planning cycle and networks were optimized accordingly, layer by layer, for cost-effective placement of capacity and efficient utilization. In particular, optimization was based on a fairly stable set of assumptions about the network architecture, equipment models, and forecast uncertainty. This special edition is devoted to heuristic approaches for telecommunications network management, planning, and expansion. We hope that this collection brings to the attention of researchers and practitioners an array of techniques and case studies that meet the stringent time to market' requirements of this industry and which deserve exposure to a wider audience. Telecommunications will face a tremendous challenge in the coming years to be able to design, build, and manage networks in such a rapidly evolving industry. Development and application of heuristic methods will be fundamental in our ability to meet this challenge.

Computer-Mediated Communication across Cultures - International Interactions in Online Environments (Hardcover, New): Kirk St.... Computer-Mediated Communication across Cultures - International Interactions in Online Environments (Hardcover, New)
Kirk St. Amant, Sigrid Kelsey
R5,030 Discovery Miles 50 300 Ships in 18 - 22 working days

Over one billion people access the Internet worldwide, and new problems of language, security, and culture accompany this new excess in access. Computer-Mediated Communication across Cultures: International Interactions in Online Environments provides readers with the foundational knowledge needed to communicate safely and effectively with individuals from other countries and cultures via online media. Through a closer examination of the expanded global access to the Web, this book discusses the use and design of cross-cultural digital media and the future of the field for executives, marketers, researchers, educators, and the average user.

Directory Services - Design, Implementation and Management (Paperback): Nancy Cox Directory Services - Design, Implementation and Management (Paperback)
Nancy Cox
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

To optimally design and manage a directory service, IS architects and managers must understand current state-of-the-art products. Directory Services covers Novell's NDS eDirectory, Microsoft's Active Directory, UNIX directories and products by NEXOR, MaxWare, Siemens, Critical Path and others. Directory design fundamentals and products are woven into case studies of large enterprise deployments. Cox thoroughly explores replication, security, migration and legacy system integration and interoperability. Business issues such as how to cost justify, plan, budget and manage a directory project are also included. The book culminates in a visionary discussion of future trends and emerging directory technologies including the strategic direction of the top directory products, the impact of wireless technology on directory enabled applications and using directories to customize content delivery from the Enterprise Portal.
Directory Services is a comprehensive and practical guide that provides organizations and consultants with a roadmap used to create the directory enabled global enterprise. To provide the reader with the core knowledge required for designing directory services, the book discusses directory fundamentals including X.500, X.509 and LDAP as well as how to cost justify, plan, budget and manage a directory project
Provides critical info for design, integration, or migration for multiple messaging platforms
Covers all major directories
Provides case studies and guidelines for deployment and integration issues

Elements of Queueing Theory - Palm Martingale Calculus and Stochastic Recurrences (Hardcover, 2nd ed. 2003): Francois Baccelli,... Elements of Queueing Theory - Palm Martingale Calculus and Stochastic Recurrences (Hardcover, 2nd ed. 2003)
Francois Baccelli, Pierre Bremaud
R2,839 Discovery Miles 28 390 Ships in 18 - 22 working days

The Palm theory and the Loynes theory of stationary systems are the two pillars of the modern approach to queuing. This book, presenting the mathematical foundations of the theory of stationaryqueuing systems, contains a thorough treatment of both of these.

This approach helps to clarify the picture, in that it separates the task of obtaining the key system formulas from that of proving convergence to a stationary state and computing its law.

The theory is constantly illustrated by classical results and models: Pollaczek-Khintchin and Tacacs formulas, Jackson and Gordon-Newell networks, multiserver queues, blocking queues, loss systems etc., but it also contains recent and significant examples, where the tools developed turn out to be indispensable.

Several other mathematical tools which are useful within this approach are also presented, such as the martingale calculus for point processes, or stochastic ordering for stationary recurrences.

This thoroughly revised second edition contains substantial additions - in particular, exercises and their solutions - rendering this now classic reference suitable for use as a textbook.

Algorithms for Next Generation Networks (Hardcover, 2010 Ed.): Graham Cormode, Marina Thottan Algorithms for Next Generation Networks (Hardcover, 2010 Ed.)
Graham Cormode, Marina Thottan
R4,270 Discovery Miles 42 700 Ships in 18 - 22 working days

Data networking now plays a major role in everyday life and new applications continue to appear at a blinding pace. Yet we still do not have a sound foundation for designing, evaluating and managing these networks.

This book covers topics at the intersection of algorithms and networking. It builds a complete picture of the current state of research on Next Generation Networks and the challenges for the years ahead. Particular focus is given to evolving research initiatives and the architecture they propose and implications for networking.

Topics: Network design and provisioning, hardware issues, layer-3 algorithms and MPLS, BGP and Inter AS routing, packet processing for routing, security and network management, load balancing, oblivious routing and stochastic algorithms, network coding for multicast, overlay routing for P2P networking and content delivery.

This timely volume will be of interest to a broad readership from graduate students to researchers looking to survey recent research its open questions.

Wireless World in 2050 and Beyond: A Window into the Future! (Hardcover, 1st ed. 2016): Ramjee Prasad, Sudhir Dixit Wireless World in 2050 and Beyond: A Window into the Future! (Hardcover, 1st ed. 2016)
Ramjee Prasad, Sudhir Dixit
R3,546 R3,285 Discovery Miles 32 850 Save R261 (7%) Ships in 10 - 15 working days

This book gathers visionary ideas from leading academics and scientists to predict the future of wireless communication and enabling technologies in 2050 and beyond. The content combines a wealth of illustrations, tables, business models, and novel approaches to the evolution of wireless communication. The book also provides glimpses into the future of emerging technologies, end-to-end systems, and entrepreneurial and business models, broadening readers' understanding of potential future advances in the field and their influence on society at large

Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications... Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications (Hardcover, 1st ed. 2013)
Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R8,955 Discovery Miles 89 550 Ships in 18 - 22 working days

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,631 Discovery Miles 26 310 Ships in 10 - 15 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

UWB Communication Systems: Conventional and 60 GHz - Principles, Design and Standards (Hardcover, 2013 ed.): Shahriar Emami UWB Communication Systems: Conventional and 60 GHz - Principles, Design and Standards (Hardcover, 2013 ed.)
Shahriar Emami
R3,638 R3,337 Discovery Miles 33 370 Save R301 (8%) Ships in 10 - 15 working days

In this book the author examines 60 GHz and conventional UWB. The book introduces the fundamentals, architectures, and applications of unified ultra wideband devices. The material includes both theory and practice and introduces ultra wideband communication systems and their applications in a systematic manner. The material is written to enable readers to design, analyze, and evaluate UWB communication systems.

Mission-Critical Microsoft Exchange 2000 - Building Highly-Available Messaging and Knowledge Management Systems (Paperback):... Mission-Critical Microsoft Exchange 2000 - Building Highly-Available Messaging and Knowledge Management Systems (Paperback)
Jerry Cochran
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous and incredibly valuable.
Mission-Critical Microsoft Exchange 2000 teaches system designers, administrators and developers the strategies, tools, and best practices they'll need to plan and implement highly-available systems on Exchange 2000 and on earlier versions of Exchange. The book explains Exchange back-up and disaster recovery techniques, Windows clustering technologies for Exchange systems, and security planning to resist messaging-based attacks. Written by Jerry Cochran, an authority on large-scale Exchange systems, Mission-Critical Microsoft Exchange 2000 helps readers create Exchange systems upon which they can build large and growing organizations.
Unique book on a crucial Exchange topic
Part of Digital Press's Exchange Server Cluster
Author is Compaq's expert on high-end Exchange systems

Implementing Software Defined Radio (Hardcover, 2012): Eugene Grayver Implementing Software Defined Radio (Hardcover, 2012)
Eugene Grayver
R3,994 Discovery Miles 39 940 Ships in 10 - 15 working days

Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these pages.The author covers the myriad options and trade-offs available when selecting an appropriate hardware architecture.As demonstrated here, the choice between hardware- and software-centric architecture can mean the difference between meeting an aggressive schedule and bogging down in endless design iterations.Because of the author's experience overseeing dozens of failed and successful developments, he is able to present many real-life examples.Some of the key concepts covered are: Choosing the right architecture for the market - laboratory, military, or commercial, Hardware platforms - FPGAs, GPPs, specialized and hybrid devices, Standardization efforts to ensure interoperability and portabilitym State-of-the-art components for radio frequency, mixed-signal, and baseband processing.

The text requires only minimal knowledge of wireless communications; whenever possible, qualitative arguments are used instead of equations.An appendix provides a quick overview of wireless communications and introduces most of the concepts the readers will need to take advantage of the material.An essential introduction to SDR, this book is sure to be an invaluable addition to any technical bookshelf."

Fog Computing in the Internet of Things - Intelligence at the Edge (Hardcover, 1st ed. 2018): Amir M. Rahmani, Pasi Liljeberg,... Fog Computing in the Internet of Things - Intelligence at the Edge (Hardcover, 1st ed. 2018)
Amir M. Rahmani, Pasi Liljeberg, Jurgo-Soeren Preden, Axel Jantsch
R3,516 Discovery Miles 35 160 Ships in 18 - 22 working days

This book describes state-of-the-art approaches to Fog Computing, including the background of innovations achieved in recent years. Coverage includes various aspects of fog computing architectures for Internet of Things, driving reasons, variations and case studies. The authors discuss in detail key topics, such as meeting low latency and real-time requirements of applications, interoperability, federation and heterogeneous computing, energy efficiency and mobility, fog and cloud interplay, geo-distribution and location awareness, and case studies in healthcare and smart space applications.

Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Advanced Wired and Wireless Networks (Hardcover, 2004 ed.): Tadeusz A. Wysocki, Arek Dadej, Beata J Wysocki Advanced Wired and Wireless Networks (Hardcover, 2004 ed.)
Tadeusz A. Wysocki, Arek Dadej, Beata J Wysocki
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

Advanced Wired and Wireless Networks brings the reader a sample of recent research efforts representative of advances in the areas of recognized importance for the future Internet, such as ad hoc networking, mobility support and performance improvements in advanced networks and protocols.

Advanced Wired and Wireless Networks is structured to meet the needs of a professional audience in industry, as well as graduate-level students in computer science and engineering.

The Read Aloud Cloud - An Innocent's Guide to the Tech Inside (Paperback): F Brazeal The Read Aloud Cloud - An Innocent's Guide to the Tech Inside (Paperback)
F Brazeal
R639 Discovery Miles 6 390 Ships in 10 - 15 working days

What is "the cloud"? Is it here or there? Should it be allowed? Should I even care? Have you ever imagined the internet as a giant Rube Goldberg machine? Or the fast-evolving cloud computing space as a literal jungle filled with prehistoric beasts? Does a data breach look like a neo-noir nightmare full of turned-up coat collars and rain-soaked alleys? Wouldn't all these vital concepts be easier to understand if they looked as interesting as they are? And wouldn't they be more memorable if we could explain them in rhyme? Whether you're a kid or an adult, the answer is: YES! The medicine in this spoonful of sugar is a sneaky-informative tour through the past, present and future of cloud computing, from mainframes to serverless and from the Internet of Things to artificial intelligence. Forrest is a professional explainer whose highly-rated conference talks and viral cartoon graphics have been teaching engineers to cloud for years. He knows that a picture is worth a thousand words. But he has plenty of words, too. Your hotel key, your boarding pass, The card you swipe to pay for gas, The smart TV atop the bar, The entertainment in your car, Your doorbell, toothbrush, thermostat, The vacuum that attacked your cat, They all connect the cloud and you. Maybe they shouldn't, but they do. As a graduation gift (call it "Oh the Places You'll Go" for engineering students), a cubicle conversation starter, or just a delightfully nerdy bedtime story for your kids, "The Read-Aloud Cloud" will be the definitive introduction to the technologies that everyone uses and nobody understands. You can even read it silently if you want. But good luck with that.

EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2018 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2018 (Hardcover, 1st ed. 2020)
Ping Zheng, Vic Callaghan, David Crawford, Tiina Kymalainen, Angelica Reyes-Munoz
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

This book presents the proceedings of the 2nd EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE' 2018), which took place at Ravensbourne University London, London, UK, on September 4, 2018. The central theme of the conference is emerging technologies in relation to business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New): Massimo Villari, Ivona... Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New)
Massimo Villari, Ivona Brandic, Francesco Tusa
R4,758 Discovery Miles 47 580 Ships in 18 - 22 working days

Cloud computing presents a promising approach for implementing scalable information and communications technology systems for private and public, individual, community, and business use. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice overviews current developments in cloud computing concepts, architectures, infrastructures and methods, focusing on the needs of small to medium enterprises. The topic of cloud computing is addressed on two levels: the fundamentals of cloud computing and its impact on the IT world; and an analysis of the main issues regarding the cloud federation, autonomic resource management, and efficient market mechanisms, while supplying an overview of the existing solutions able to solve them. This publication is aimed at both enterprise business managers and research and academic audiences alike.

Conductor: Distributed Adaptation for Heterogeneous Networks (Hardcover, 2002 ed.): Mark D. Yarvis, Peter Reiher, Gerald J.... Conductor: Distributed Adaptation for Heterogeneous Networks (Hardcover, 2002 ed.)
Mark D. Yarvis, Peter Reiher, Gerald J. Popek
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

Internet heterogeneity is driving a new challenge in application development: adaptive software. Together with the increased Internet capacity and new access technologies, network congestion and the use of older technologies, wireless access, and peer-to-peer networking are increasing the heterogeneity of the Internet. Applications should provide gracefully degraded levels of service when network conditions are poor, and enhanced services when network conditions exceed expectations. Existing adaptive technologies, which are primarily end-to-end or proxy-based and often focus on a single deficient link, can perform poorly in heterogeneous networks. Instead, heterogeneous networks frequently require multiple, coordinated, and distributed remedial actions. Conductor: Distributed Adaptation for Heterogeneous Networks describes a new approach to graceful degradation in the face of network heterogeneity - distributed adaptation - in which adaptive code is deployed at multiple points within a network. The feasibility of this approach is demonstrated by conductor, a middleware framework that enables distributed adaptation of connection-oriented, application-level protocols. By adapting protocols, conductor provides application-transparent adaptation, supporting both existing applications and applications designed with adaptation in mind. Conductor: Distributed Adaptation for Heterogeneous Networks introduces new techniques that enable distributed adaptation, making it automatic, reliable, and secure. In particular, we introduce the notion of semantic segmentation, which maintains exactly-once delivery of the semantic elements of a data stream while allowing the stream to be arbitrarily adapted in transit. We also introduce a secure architecture for automatic adaptor selection, protecting user data from unauthorized adaptation. These techniques are described both in the context of conductor and in the broader context of distributed systems. Finally, this book presents empirical evidence from several case studies indicating that distributed adaptation can allow applications to degrade gracefully in heterogeneous networks, providing a higher quality of service to users than other adaptive techniques. Further, experimental results indicate that the proposed techniques can be employed without excessive cost. Thus, distributed adaptation is both practical and beneficial. Conductor: Distributed Adaptation for Heterogeneous Networks is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science.

Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

Ten Laws for Security (Hardcover, 1st ed. 2016): Eric Diehl Ten Laws for Security (Hardcover, 1st ed. 2016)
Eric Diehl
R2,438 Discovery Miles 24 380 Ships in 10 - 15 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Fibre Channel - Connection To The Future (Hardcover, 2nd edition): Fibrechannelindustryassoc Fibre Channel - Connection To The Future (Hardcover, 2nd edition)
Fibrechannelindustryassoc
R753 Discovery Miles 7 530 Ships in 10 - 15 working days

The Fibre Channel Association is an international organization devoted to educating and promoting the Fibre Channel standard.
.A thorough introduction to the Fibre Channel standard, including structures, features, and terminology
.Discusses typical applications for Fibre Channel
"

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,020 Discovery Miles 60 200 Ships in 18 - 22 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830

 

Partners