0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (334)
  • R250 - R500 (886)
  • R500+ (13,957)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Grid and Cloud Computing - A Business Perspective on Technology and Applications (Hardcover, 2010 ed.): Katarina Stanoevska,... Grid and Cloud Computing - A Business Perspective on Technology and Applications (Hardcover, 2010 ed.)
Katarina Stanoevska, Thomas Wozniak, Santi Ristol
R3,094 Discovery Miles 30 940 Ships in 10 - 15 working days

In today's dynamic business environment, IT departments are under permanent pressure to meet two divergent requirements: to reduce costs and to support business agility with higher flexibility and responsiveness of the IT infrastructure. Grid and Cloud Computing enable a new approach towards IT. They enable increased scalability and more efficient use of IT based on virtualization of heterogeneous and distributed IT resources. This book provides a thorough understanding of the fundamentals of Grids and Clouds and of how companies can benefit from them. A wide array of topics is covered, e.g. business models and legal aspects. The applicability of Grids and Clouds in companies is illustrated with four cases of real business experiments. The experiments illustrate the technical solutions and the organizational and IT governance challenges that arise with the introduction of Grids and Clouds. Practical guidelines on how to successfully introduce Grids and Clouds in companies are provided.

Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016): Stefan Beissel Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016)
Stefan Beissel
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well-founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common understanding using economic aspects, and to provide cost transparency for the senior management.

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R5,785 R4,638 Discovery Miles 46 380 Save R1,147 (20%) Ships in 12 - 17 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Advances in Communication, Devices and Networking - Proceedings of ICCDN 2019 (Hardcover, 1st ed. 2020): Rabindranath Bera,... Advances in Communication, Devices and Networking - Proceedings of ICCDN 2019 (Hardcover, 1st ed. 2020)
Rabindranath Bera, Prashant Chandra Pradhan, Chuan-Ming Liu, Sourav Dhar, Samarendra Nath Sur
R5,807 Discovery Miles 58 070 Ships in 10 - 15 working days

This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the International Conference on Communication, Devices and Networking (ICCDN 2019), which was organized by the Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim, India, on 9-10 December 2019. Gathering cutting-edge research papers prepared by researchers, engineers and industry professionals, it will help young and experienced scientists and developers alike to explore new perspectives, and offer them inspirations on how to address real-world problems in the areas of electronics, communication, devices and networking.

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback): Bharat Bhushan, Sudhir Kumar... Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback)
Bharat Bhushan, Sudhir Kumar Sharma, Muzafer Saracevic, Azedine Boulmakoul
R3,361 R3,047 Discovery Miles 30 470 Save R314 (9%) Ships in 12 - 17 working days

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.

Artificial Organic Networks - Artificial Intelligence Based on Carbon Networks (Hardcover, 2014 ed.): Hiram Ponce Espinosa,... Artificial Organic Networks - Artificial Intelligence Based on Carbon Networks (Hardcover, 2014 ed.)
Hiram Ponce Espinosa, Pedro Ponce-Cruz, Arturo Molina
R4,347 R3,489 Discovery Miles 34 890 Save R858 (20%) Ships in 12 - 17 working days

This monograph describes the synthesis and use of biologically-inspired artificial hydrocarbon networks (AHNs) for approximation models associated with machine learning and a novel computational algorithm with which to exploit them. The reader is first introduced to various kinds of algorithms designed to deal with approximation problems and then, via some conventional ideas of organic chemistry, to the creation and characterization of artificial organic networks and AHNs in particular.

The advantages of using organic networks are discussed with the rules to be followed to adapt the network to its objectives. Graph theory is used as the basis of the necessary formalism. Simulated and experimental examples of the use of fuzzy logic and genetic algorithms with organic neural networks are presented and a number of modeling problems suitable for treatment by AHNs are described:

. approximation;

. inference;

. clustering;

. control;

. classification; and

. audio-signal filtering.

The text finishes with a consideration of directions in which AHNs could be implemented and developed in future. A complete LabVIEW toolkit, downloadable from the book s page at springer.com enables readers to design and implement organic neural networks of their own.

The novel approach to creating networks suitable for machine learning systems demonstrated in "Artificial Organic Networks" will be of interest to academic researchers and graduate students working in areas associated with computational intelligence, intelligent control, systems approximation and complex networks."

Biometric Authentication in Online Learning Environments (Hardcover): A.V. Senthil Kumar Biometric Authentication in Online Learning Environments (Hardcover)
A.V. Senthil Kumar
R5,354 Discovery Miles 53 540 Ships in 12 - 17 working days

Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.

Real-World Wireless Sensor Networks - Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September... Real-World Wireless Sensor Networks - Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September 19-20, 2013 (Hardcover, 2014 ed.)
Koen Langendoen, Wen Hu, Federico Ferrari, Marco Zimmerling, Luca Mottola
R4,841 Discovery Miles 48 410 Ships in 12 - 17 working days

This edited book presents the results of the 5th Workshop on Real-world Wireless Sensor Networks (REALWSN). The purpose of this workshopwas to bring together researchers and practitioners working in the area of sensor networks, with focus on real-world experiments or deployments of wireless sensor networks. Included were, nonetheless, emerging forms of sensing such as those that leverage smart phones, Internet of Things, RFIDs, and robots. Indeed, when working with real-world experiments or deployments, many new or unforeseen issues may arise: the network environment may be composed of a variety of different technologies, leading to very heterogeneous network structures; software development for large scale networks poses new types of problems; the performance of prototype networks may differ significantly from the deployed system; whereas actual sensor network deployments may need a complex combination of autonomous and manual configuration. Furthermore, results obtained through simulation are typically not directly applicable to operational networks; it is therefore imperative for the community to produce results from experimental research. The workshop collected the state of the art in emerging and current research trends dealing with Real-world Wireless Sensor Networks, with the aim of representing a stepping stone for future research in this field."

Handbook of Computer Networks and Communications: Volume II (Hardcover): Akira Hanako Handbook of Computer Networks and Communications: Volume II (Hardcover)
Akira Hanako
R3,063 Discovery Miles 30 630 Ships in 12 - 17 working days
Multi-Camera Networks - Principles and Applications (Hardcover): Hamid Aghajan, Andrea Cavallaro Multi-Camera Networks - Principles and Applications (Hardcover)
Hamid Aghajan, Andrea Cavallaro
R2,809 Discovery Miles 28 090 Ships in 12 - 17 working days

The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware

This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures, embedded processing, sensor fusion and middleware, calibration and topology, network-based detection and tracking, and applications in distributed and collaborative methods in camera networks. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate students working in signal and video processing, computer vision, and sensor networks.

Hamid Aghajan is a Professor of Electrical Engineering (consulting) at Stanford University. His research is on multi-camera networks for smart environments with application to smart homes, assisted living and well being, meeting rooms, and avatar-based communication and social interactions. He is Editor-in-Chief of Journal of Ambient Intelligence and Smart Environments, and was general chair of ACM/IEEE ICDSC 2008.

Andrea Cavallaro is Reader (Associate Professor) at Queen Mary, University of London (QMUL). His research is on target tracking and audiovisual content analysis for advanced surveillance and multi-sensor systems. He serves as Associate Editor of the IEEE Signal Processing Magazine and the IEEE Trans. on Multimedia, and has been general chair of IEEE AVSS 2007, ACM/IEEE ICDSC 2009 and BMVC 2009.
The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware"

Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New): Dale Liu Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New)
Dale Liu
R1,332 Discovery Miles 13 320 Ships in 12 - 17 working days

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail.
Cisco Router and Switch Forensics is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points.
Why is this focus on network devices necessary? Because criminals are targeting networks, and network devices require a fundamentally different approach than the process taken with traditional forensics. By hacking a router, an attacker can bypass a network's firewalls, issue a denial of service (DoS) attack to disable the network, monitor and record all outgoing and incoming traffic, or redirect that communication anywhere they like. But capturing this criminal activity cannot be accomplished with the tools and techniques of traditional forensics. While forensic analysis of computers or other traditional media typically involves immediate shut-down of the target machine, creation of a duplicate, and analysis of static data, this process rarely recovers live system data. So, when an investigation focuses on live network activity, this traditional approach obviously fails. Investigators must recover data as it is transferred via the router or switch, because it is destroyed when the network device is powered down. In this case, following the traditional approach outlined in books on general computer forensics techniques is not only insufficient, but also essentially harmful to an investigation.
Jargon buster: A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). A router is a more sophisticated network device that joins multiple wired or wireless networks together.
* The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet
* Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity
* Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony

Deploying QoS for Cisco IP and Next Generation Networks - The Definitive Guide (Hardcover): Vinod Joseph, Brett Chapman Deploying QoS for Cisco IP and Next Generation Networks - The Definitive Guide (Hardcover)
Vinod Joseph, Brett Chapman
R1,381 Discovery Miles 13 810 Ships in 12 - 17 working days

"Deploying QoS for IP Next Generation Networks: The Definitive Guide" provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data applications creating a converged infrastructure. It further provides detailed design and implementation details for various service deployments across the various Cisco platforms such as the CRS-1, 12000, 7600 & 7200 series routers that are widely deployed in most Carrier Networks.
The book covers architectural and implementation specific information plus recommendations for almost all the popular line cards across the various hardware platforms widely used in the market. It also addresses QoS architecture and deployment on the Cisco CRS-1 platform and is considered as a unique selling point of this book.
In short the books serve as an "On the Job Manual" which can also be used as a study guide for Cisco specialist certification programs (CCNA, CCIP, CCIE)
This book will includes detailed illustration and configurations. In addition, it provides detailed case studies along with platform specific tests and measurement results. A link to a detailed tutorial on QoS metrics and associated test results will be available at the book's companion website in order to ensure that the reader is able to understand QoS functionality from a deployment standpoint.
Covers the requirements and solutions in deploying QoS for voice, video, IPTV, mobility and data traffic classes (Quad-play networks), saving the reader time in searching for hardware specific QoS information, given the abundance of Cisco platforms and line cards.Presents real-life deployments by means of detailed case studies, allowing the reader to apply the same solutions to situations in the work place.Provides QoS architecture and implementation details on Cisco CRS-1, 12000, 7600, and 7200 routing platforms using Cisco IOS/IOS-XR software, aiding the reader in using these devices and preparing for Cisco specialist certification.

Implementing EDI (Hardcover): Mike Hendry Implementing EDI (Hardcover)
Mike Hendry
R2,968 Discovery Miles 29 680 Ships in 10 - 15 working days

This superb introduction examines all aspects of implementation from concept to reality, and spells out the pros, cons, and effects of EDI in your organization. The cost of EDI hardware, software, training, transmission, and maintenance are broken down and clearly explained to prevent problems and maximize benefits. Checklists and procedural guidelines are also offered to ease your EDI transition -- so that you're never left with a system you can't put online quickly and efficiently.

Novel Practices and Trends in Grid and Cloud Computing (Hardcover): Pethuru Raj, S Koteeswaran Novel Practices and Trends in Grid and Cloud Computing (Hardcover)
Pethuru Raj, S Koteeswaran
R6,992 Discovery Miles 69 920 Ships in 12 - 17 working days

Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.

Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications... Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, Manchester, UK, June 10-11, 2020, Proceedings (Hardcover, 1st ed. 2020)
Julian M. Bass, P.J. Wall
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.

Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools... Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools (Hardcover)
Ivan Ganchev, R. D. van der Mei, Hans van den Berg
R1,772 Discovery Miles 17 720 Ships in 12 - 17 working days
Handbook of Computer Networks and Communications: Volume I (Hardcover): Akira Hanako Handbook of Computer Networks and Communications: Volume I (Hardcover)
Akira Hanako
R3,062 Discovery Miles 30 620 Ships in 12 - 17 working days
Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover): Jean-Philippe Vasseur, Mario... Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover)
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester
R2,638 Discovery Miles 26 380 Ships in 12 - 17 working days

"Network Recovery" is the first book to provide detailed information on protecting and restoring communication networks, and it sets a sky-high standard for any that may follow. Inside, you ll learn specific techniques that work at each layer of the networking hierarchy including optical, SONET-SDH, IP, and MPLS as well as multi-layer escalation strategies that offer the highest level of protection. The authors begin with an incisive introduction to the issues that define the field of network protection and restoration, and as the book progresses they explain everything you need to know about the relevant protocols, providing theoretical analyses wherever appropriate. If you work for a network-dependent organization, large or small, you ll want to keep Network Recovery within reach at all times.
* Shows you how to implement protection and recovery techniques that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one another, so you can develop an optimal network recovery design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers theoretical analyses wherever this information contributes to your practical knowledge."

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R4,156 Discovery Miles 41 560 Ships in 12 - 17 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

P2P Networking and Applications (Hardcover): John Buford, Heather Yu, Eng Keong Lua P2P Networking and Applications (Hardcover)
John Buford, Heather Yu, Eng Keong Lua
R1,644 Discovery Miles 16 440 Ships in 12 - 17 working days

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of academic and clinical information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, Peer-to-Peer Networking and Applications explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models. The book also delineates the latest research directions, thereby providing not only a sophisticated understanding of current systems, but also the means to improve upon these systems with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.
* Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
* Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
* Provides online access to the Overlay Weaver P2P emulator, an open source tool that supports a number of peer-to-peer applications with which readers can practice.

Intelligent Renewable Energy Systems - Modelling and Control (Hardcover, 1st ed. 2016): Gerasimos Rigatos Intelligent Renewable Energy Systems - Modelling and Control (Hardcover, 1st ed. 2016)
Gerasimos Rigatos
R5,174 Discovery Miles 51 740 Ships in 12 - 17 working days

Focused on renewable energy systems and the development of information and communication technologies (ICTs) for their integration in smart grids, this book presents recent advances and methods that help to ensure that power generation from renewable sources remains stable, that power losses are minimized, and that the reliable functioning of these power generation units is maintained. The book highlights key topics and technologies for renewable energy systems including the intelligent control of power generators, power electronics that connect renewable power generation units to the grid, and fault diagnosis for power generators and power electronics. In particular, the following topics are addressed: * Modeling and control of power generators (PMSGs, DFIGs); * Modeling and control of power electronics (converters, inverters); * Modeling and fault diagnosis of the transmission and distribution Grid; and * Modelling and control of distributed power generation units (interconnected synchronous generators or photovoltaic units). Because of the above coverage, members of the wider engineering community will find that the nonlinear control and estimation methods presented provide essential insights into the functioning of renewable energy power systems, while the academic community will find the book a valuable textbook for undergraduate or graduate courses on renewable energy systems.

Next Generation SSH2 Implementation - Securing Data in Motion (Paperback): Dale Liu Next Generation SSH2 Implementation - Securing Data in Motion (Paperback)
Dale Liu
R1,010 Discovery Miles 10 100 Ships in 12 - 17 working days

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.
This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.

* Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox.

Network Quality of Service Know It All (Hardcover): Adrian Farrel Network Quality of Service Know It All (Hardcover)
Adrian Farrel
R1,870 Discovery Miles 18 700 Ships in 12 - 17 working days

The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This book brings all of the elements of network quality of service (QoS) together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network QoS, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
* Chapters contributed by recognized experts cover theory and practice of network quality of service (QoS), allowing the reader to develop a new level of knowledge and technical expertise.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Use of examples illustrate core QoS concepts for enhanced comprehension

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Hardcover, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,813 Discovery Miles 48 130 Ships in 12 - 17 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Spectrum Access and Management for Cognitive Radio Networks (Hardcover, 1st ed. 2017): Mohammad A. Matin Spectrum Access and Management for Cognitive Radio Networks (Hardcover, 1st ed. 2017)
Mohammad A. Matin
R4,095 R3,518 Discovery Miles 35 180 Save R577 (14%) Ships in 12 - 17 working days

This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,875 Discovery Miles 18 750
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,317 Discovery Miles 13 170
Digital Signal Processing and…
Dag Stranneby Paperback R1,406 Discovery Miles 14 060
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,490 Discovery Miles 14 900
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240

 

Partners