0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (253)
  • R250 - R500 (862)
  • R500+ (13,665)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,020 Discovery Miles 60 200 Ships in 18 - 22 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,522 R2,415 Discovery Miles 24 150 Save R1,107 (31%) Ships in 10 - 15 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

UWB Communication Systems: Conventional and 60 GHz - Principles, Design and Standards (Hardcover, 2013 ed.): Shahriar Emami UWB Communication Systems: Conventional and 60 GHz - Principles, Design and Standards (Hardcover, 2013 ed.)
Shahriar Emami
R3,638 R3,337 Discovery Miles 33 370 Save R301 (8%) Ships in 10 - 15 working days

In this book the author examines 60 GHz and conventional UWB. The book introduces the fundamentals, architectures, and applications of unified ultra wideband devices. The material includes both theory and practice and introduces ultra wideband communication systems and their applications in a systematic manner. The material is written to enable readers to design, analyze, and evaluate UWB communication systems.

Cable Engineering for Local Area Networks (Hardcover): B.J. Elliott Cable Engineering for Local Area Networks (Hardcover)
B.J. Elliott
R3,208 Discovery Miles 32 080 Ships in 10 - 15 working days

This book provides a complete guide to the design, procurement, installation and testing procedures for local area networks (LANs) using both copper and optical fibre cable technology. International, European and American LAN and premises cabling standards are explained and compared including the latest Category 5, Category 6 and Category 7 proposals. The latest standards in testing, electromagnetic compatibility (EMC) compliance and fire safety are also covered in detail.
By describing the theory as well as the practical issues involved, this book is an unrivalled source of information for those who need to understand, at a time of very rapid change, the complexities of today's office-based LANs.
British courses such as City and Guilds course 3466, Copper and Optical Communications
C & G courses in Telecommunications and Electronics Engineering 2720, 2760 and 3478
NVQ and SNVQ courses on copper and fibre communications technology, levels one to five
Future qualifications to be developed by the European Institute of Telecommunications Engineering and the European Intelligent buildings group
American Certified Electronics Technician, Certified Fiber Optics Installer, Certified Network Systems Technician and Telecommunications Electronics Technician courses
BICSI courses such as RCDD where the book's coverage of European and international standards is very useful
BTEC and BSc courses on electronic and communications engineering
In addition it is a valuable resource for IT managers, consultants, cable installation engineers and system designers who need to understand the technology and physics behind the subject and the huge range of standards that apply to cable engineering

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,357 Discovery Miles 13 570 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover): Chetna Singhal, Swades De Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover)
Chetna Singhal, Swades De
R4,823 Discovery Miles 48 230 Ships in 18 - 22 working days

With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research on upcoming 5G technologies for next generation mobile networks, examining the various features, solutions, and challenges associated with such advances. Highlighting relevant coverage across topics such as energy efficiency, user support, and adaptive multimedia services, this book is ideally designed for academics, professionals, graduate students, and professionals interested in novel research for wireless innovations.

Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover): George Mastorakis, Constandinos X.... Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover)
George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R5,463 Discovery Miles 54 630 Ships in 18 - 22 working days

As more and more of our data is stored remotely, accessing that data wherever and whenever it is needed is a critical concern. More concerning is managing the databanks and storage space necessary to enable cloud systems. Resource Management of Mobile Cloud Computing Networks and Environments reports on the latest advances in the development of computationally intensive and cloud-based applications. Covering a wide range of problems, solutions, and perspectives, this book is a scholarly resource for specialists and end-users alike making use of the latest cloud technologies.

Data Network Engineering (Hardcover, 1999 ed.): Tim King, Dave Newson Data Network Engineering (Hardcover, 1999 ed.)
Tim King, Dave Newson
R4,201 Discovery Miles 42 010 Ships in 18 - 22 working days

It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."

Technological Advancements and the Impact of Actor-Network Theory (Hardcover): Arthur Tatnall Technological Advancements and the Impact of Actor-Network Theory (Hardcover)
Arthur Tatnall
R4,801 Discovery Miles 48 010 Ships in 18 - 22 working days

Actor-Network Theory (ANT) has existed as a topic of interest among social theorists for decades. Due to the prevalence of technology in modern society, discussions over the influence of actor-network theory on the changing scope of technology can assist in facilitating further research and scientific thought. Technological Advancements and the Impact of Actor-Network Theory focuses on cross-disciplinary research as well as examples of the use of actor-network theory in a variety of fields, including medicine, education, business, engineering, environmental science, computer science, and social science. This timely publication is well-suited for reference use by academicians, researchers, upper-level students, and theorists. Topics Covered The many academic areas covered in this publication include, but are not limited to: Digital Communication E-Health Human Interaction Information and Communication Technologies Online Education Online Investing Public Service Innovation Software Development

Grid and Services Evolution (Hardcover, 2009 ed.): Norbert Meyer, Domenico Talia, Ramin Yahyapour Grid and Services Evolution (Hardcover, 2009 ed.)
Norbert Meyer, Domenico Talia, Ramin Yahyapour
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain, June 5-6, 2008.

Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments.

Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,031 R2,746 Discovery Miles 27 460 Save R285 (9%) Ships in 18 - 22 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,473 Discovery Miles 64 730 Ships in 10 - 15 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,424 R1,924 Discovery Miles 19 240 Save R1,500 (44%) Ships in 10 - 15 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International... Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International Workshop on Protocols for High-Speed Networks (PfHSN '99) August 25-27, 1999, Salem, Massachusetts, USA (Hardcover, 2000 ed.)
Joseph D. Touch, James P.G. Sterbenz
R5,300 Discovery Miles 53 000 Ships in 18 - 22 working days

1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia Antipolis I Nice (1996- the Mediterranean Sea). PfHSN is a workshop providing an international forum for the exchange of information on high-speed networks. It is a relatively small workshop, limited to 80 participants or less, to encourage lively discussion and the active participation of all attendees. A significant component of the workshop is interactive in nature, with a long history of significant time reserved for discussions. This was enhanced in 1996 by Christophe Diot and W allid Dabbous with the institution of Working Sessions chaired by an "animator," who is a distinguished researcher focusing on topical issues of the day. These sessions are an audience participation event, and are one of the things that makes PfHSN a true "working conference."

Amazon CloudSearch Developer Guide (Hardcover): Documentation Team Amazon CloudSearch Developer Guide (Hardcover)
Documentation Team
R1,721 Discovery Miles 17 210 Ships in 18 - 22 working days
Cloud Computing: A Futuristic Approach (Hardcover): Amanda Wegener Cloud Computing: A Futuristic Approach (Hardcover)
Amanda Wegener
R3,233 R2,928 Discovery Miles 29 280 Save R305 (9%) Ships in 18 - 22 working days
Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Intelligent Multimedia Data Analysis (Hardcover): Siddhartha Bhattacharyya, Indrajit Pan, Abhijit Das, Shibakali Gupta Intelligent Multimedia Data Analysis (Hardcover)
Siddhartha Bhattacharyya, Indrajit Pan, Abhijit Das, Shibakali Gupta; Contributions by Dibya Jyoti Bora, …
R3,633 Discovery Miles 36 330 Ships in 10 - 15 working days

This volume comprises eight well-versed contributed chapters devoted to report the latest findings on the intelligent approaches to multimedia data analysis. Multimedia data is a combination of different discrete and continuous content forms like text, audio, images, videos, animations and interactional data. At least a single continuous media in the transmitted information generates multimedia information. Due to these different types of varieties, multimedia data present varied degrees of uncertainties and imprecision, which cannot be easy to deal by the conventional computing paradigm. Soft computing technologies are quite efficient to handle the imprecision and uncertainty of the multimedia data and they are flexible enough to process the real-world information. Proper analysis of multimedia data finds wide applications in medical diagnosis, video surveillance, text annotation etc. This volume is intended to be used as a reference by undergraduate and post graduate students of the disciplines of computer science, electronics and telecommunication, information science and electrical engineering. THE SERIES: FRONTIERS IN COMPUTATIONAL INTELLIGENCE The series Frontiers In Computational Intelligence is envisioned to provide comprehensive coverage and understanding of cutting edge research in computational intelligence. It intends to augment the scholarly discourse on all topics relating to the advances in artifi cial life and machine learning in the form of metaheuristics, approximate reasoning, and robotics. Latest research fi ndings are coupled with applications to varied domains of engineering and computer sciences. This field is steadily growing especially with the advent of novel machine learning algorithms being applied to different domains of engineering and technology. The series brings together leading researchers that intend to continue to advance the fi eld and create a broad knowledge about the most recent state of the art.

Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99)... Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99) November 22-26, 1999, Pathumthani, Thailand (Hardcover, 2000 ed.)
Thongchai Yongchareon, Finn Arve Aagesen, Vilas Wuwongse
R5,400 Discovery Miles 54 000 Ships in 18 - 22 working days

Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire `an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: Teleservices, service architecture and service creation; Middleware and specification languages; Mobile agents, active networks, plug-and-play issues; and Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.

Communications in Interference Limited Networks (Hardcover, 1st ed. 2016): Wolfgang Utschick Communications in Interference Limited Networks (Hardcover, 1st ed. 2016)
Wolfgang Utschick
R4,942 Discovery Miles 49 420 Ships in 10 - 15 working days

This book offers means to handle interference as a central problem of operating wireless networks. It investigates centralized and decentralized methods to avoid and handle interference as well as approaches that resolve interference constructively. The latter type of approach tries to solve the joint detection and estimation problem of several data streams that share a common medium. In fact, an exciting insight into the operation of networks is that it may be beneficial, in terms of an overall throughput, to actively create and manage interference. Thus, when handled properly, "mixing" of data in networks becomes a useful tool of operation rather than the nuisance as which it has been treated traditionally. With the development of mobile, robust, ubiquitous, reliable and instantaneous communication being a driving and enabling factor of an information centric economy, the understanding, mitigation and exploitation of interference in networks must be seen as a centrally important task.

Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018): Punnarumol Temdee,... Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018)
Punnarumol Temdee, Ramjee Prasad
R3,246 Discovery Miles 32 460 Ships in 18 - 22 working days

This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware computing - both past and present - to offer readers the knowledge needed to critically analyse how context awareness can be put to use. It is particularly to those new to the subject area who are interested in learning how to develop context-aware computing-oriented applications, as well as postgraduates and researchers in computer engineering, communications engineering related areas of information technology (IT). Further it provides practical know-how for professionals working in IT support and technology, consultants and business decision-makers and those working in the medical, human, and social sciences.

Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and... Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and Modelling (ONDM'98) February 9-11, 1998 Rome, Italy (Hardcover, 1999 ed.)
Giancarlo De Marchis, Roberto Sabella
R2,678 Discovery Miles 26 780 Ships in 18 - 22 working days

Optical Network Design and Modelling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail:
-- Routing strategies and algorithms for optical networks; -- Network planning and design; -- Wavelength conversion and wavelength assignment in optical networks; -- Technologies for optical networks (transport, access and local area networks); -- Transmission aspects in wide area optical networks; -- New paradigms for traffic modelling.

This book contains the selected proceedings of the Second International Working Conference on Optical Network Design and Modelling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 1998, in Rome, Italy.

This valuable new book will be essential reading for personnel in computer/communication industries, and for academic and research staff in computer science and electrical engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners