![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
"The Definitive Guide to SUSE Linux Enterprise Server" is a comprehensive guide to Novell's SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugt, noted author, consultant, and trainer, guides you through the most important aspects of SLES, beginning with an in-depth overview of installation and configuration tasks. In the opening chapters, you will learn how to configure network capabilities, efficiently manage software updates, and manage the file system. Later chapters are devoted to configuration and deployment of key network services including the MySQL database, CUPS, Samba, PostFix, FTP, DNS, proxy servers, and more. Along the way, van Vugt illustrates important administration concepts such as instituting strict file system security and server automation. Since increasing demands are placed on these services, you'll learn how to cluster servers together to lessen downtime and increase performance.
The more rapid rate of increase in the speed of microprocessor technology than in memory speeds has created a serious 'memory gap' for computer designers and manufacturers. "High Performance Memory Systems" addresses this issue and examines all aspects of improving the memory system performance of general-purpose programs. Current research highlights from both industry and academia focus on: coherence, synchronization, and allocation; power-awareness, reliability, and reconfigurability; software-based memory tuning; architecture design issues; and workload considerations. Topics and features: *both harware and software approaches to scalability and speed disparities are considered *introductory chapter provides broad examination of high performance memory systems *includes coverage of topics from several important international conferences Edited by leading international authorities in the field, this new work provides a survey from researchers and practitioners on advances in technology, architecture, and algorithms that address scalability needs in multiprocessors and the expanding gap between CPU/network and memory speeds. It is ideally suited to researchers and R & D professionals with interests or practice in computer engineering, computer architecture, and processor architecture.
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
This book addresses dynamic modelling methodology and analyses of tree-type robotic systems. Such analyses are required to visualize the motion of a system without really building it. The book contains novel treatment of the tree-type systems using concept of kinematic modules and the corresponding Decoupled Natural Orthogonal Complements (DeNOC), unified representation of the multiple-degrees-of freedom-joints, efficient recursive dynamics algorithms, and detailed dynamic analyses of several legged robots. The book will help graduate students, researchers and practicing engineers in applying their knowledge of dynamics for analysis of complex robotic systems. The knowledge contained in the book will help one in virtual testing of robot operation, trajectory planning and control.
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
Provides comprehensive research ideas about Edge-AI technology that can assist doctors in making better data-driven decisions and will provide insights to researchers about healthcare industry, trends and future perspective. Examines how healthcare systems of the future will operate, by augmenting clinical resources and ensuring optimal patient outcomes. Provides insight about how Edge-AI is revolutionizing decision making, early warnings for conditions, and visual inspection in healthcare. Highlight trends, challenges, opportunities and future areas where Healthcare informatics deal with accessing vast data sets of potentially life-saving information.
Verification of real-time requirements in systems-on-chip becomes more complex as more applications are integrated. Predictable and composable systems can manage the increasing complexity using formal verification and simulation. This book explains the concepts of predictability and composability and shows how to apply them to the design and analysis of a memory controller, which is a key component in any real-time system.
Gives broad perspective on 5G communications with a focus on smart cities Discusses artificial intelligence in future wireless communication and its applications Provides a systemic and comprehensive coverage of 6G technologies, challenges and use cases Explores role of future wireless in safety, health, and transport in smart cities Includes case studies of future wireless communications
This book presents the basics of both NAND flash storage and machine learning, detailing the storage problems the latter can help to solve. At a first sight, machine learning and non-volatile memories seem very far away from each other. Machine learning implies mathematics, algorithms and a lot of computation; non-volatile memories are solid-state devices used to store information, having the amazing capability of retaining the information even without power supply. This book will help the reader understand how these two worlds can work together, bringing a lot of value to each other. In particular, the book covers two main fields of application: analog neural networks (NNs) and solid-state drives (SSDs). After reviewing the basics of machine learning in Chapter 1, Chapter 2 shows how neural networks can mimic the human brain; to accomplish this result, neural networks have to perform a specific computation called vector-by-matrix (VbM) multiplication, which is particularly power hungry. In the digital domain, VbM is implemented by means of logic gates which dictate both the area occupation and the power consumption; the combination of the two poses serious challenges to the hardware scalability, thus limiting the size of the neural network itself, especially in terms of the number of processable inputs and outputs. Non-volatile memories (phase change memories in Chapter 3, resistive memories in Chapter 4, and 3D flash memories in Chapter 5 and Chapter 6) enable the analog implementation of the VbM (also called "neuromorphic architecture"), which can easily beat the equivalent digital implementation in terms of both speed and energy consumption. SSDs and flash memories are strictly coupled together; as 3D flash scales, there is a significant amount of work that has to be done in order to optimize the overall performances of SSDs. Machine learning has emerged as a viable solution in many stages of this process. After introducing the main flash reliability issues, Chapter 7 shows both supervised and un-supervised machine learning techniques that can be applied to NAND. In addition, Chapter 7 deals with algorithms and techniques for a pro-active reliability management of SSDs. Last but not least, the last section of Chapter 7 discusses the next challenge for machine learning in the context of the so-called computational storage. No doubt that machine learning and non-volatile memories can help each other, but we are just at the beginning of the journey; this book helps researchers understand the basics of each field by providing real application examples, hopefully, providing a good starting point for the next level of development.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
This book provides insights on how to approach and utilize data science tools, technologies and methodologies related to artificial intelligence (AI) in industrial contexts. It explains the essence of distributed computing and AI-technologies, and their inter-connections. Description of various technology and methodology approaches, and their purpose and benefits when developing AI-solution in industrial contexts is included. In addition, it summarizes experiences from AI technology deployment projects from several industrial sectors. Features: Presents compendium of methodologies and technologies in Industrial AI and digitalization. Illustrates sensor to actuation approach showing complete cycle, that defines and differences AI and digitalization concept. Covers a broad range of academic and industrial issues within the field of asset management. Discusses impact of Industry 4.0 in other sectors. Includes a dedicated chapter on real-time case studies. This book is aimed at researchers and professionals in industrial and software engineering, network security, AI and ML, engineering managers, operational and maintenance specialists, asset managers, digital and AI manufacturing specialists.
Cloud based Multi-Modal Information Analytics: A Hands-on Approach discusses the various modalities of data and provide an aggregated solutions using cloud. It includes the fundamentals of neural networks, different types and how it can be used for the multi-modal information analytics. The various application areas that are image-centric and video are also presented with deployment solutions in the cloud. Features Life cycle of the multi- modal data analytics is discussed with applications of modalities of text, image, and video. Deep Learning fundamentals and architectures covering CNN, RNN and its types for learning for different multi-modal networks. Applications of Multi-Modal Analytics covering Text , Speech, and Image. This book is aimed at researchers in Multi-modal analytics and related areas
This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson.
This book provides an introduction to decision making in a distributed computational framework. Classical detection theory assumes a centralized configuration. All observations are processed by a central processor to produce the decision. In the decentralized detection system, distributed detectors generate decisions based on locally available observations; these decisions are then conveyed to the fusion center that makes the global decision. Using numerous examples throughout the book, the author discusses such distributed detection processes under several different formulations and in a wide variety of network topologies.
This book uses automotive embedded systems as an example to introduce functional safety assurance and safety-aware cost optimization. The book explores functional safety assurance from the perspectives of verification, enhancement, and validation. The functional safety assurance methods implement a safe and efficient assurance system that integrates safety verification, enhancement, and validation. The assurance methods offered in this book could provide a reasonable and scientific theoretical basis for the subsequent formulation of automotive functional safety standards. The safety-aware cost optimization methods divide cost types according to the essential differences of various costs in system design and establish reasonable models based on different costs. The cost optimization methods provided in this book could give appropriate cost optimization solutions for the cost-sensitive automotive industry, thereby achieving effective cost management and control. Functional safety assurance methods and safety-aware cost optimization support each other and jointly build the architecture of functional safety design methodologies for automotive embedded systems. The work aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in hardware cost optimization and development cost optimization design methods based on ensuring functional safety in general.
1. Covers latest concepts in intelligent analytics for industry 4.0. 2. Presents the applications of intelligent analytics for various industry 4.0 domains. 3. Covers latest research topics in the field. 4. Written in a comprehensive and simple manner. 5. The text is accompanied by tables and illustrative figures for better understanding of the topic.
Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.
The developments in mesh generation are usually driven by the needs of new applications and/or novel algorithms. The last decade has seen a renewed interest in mesh generation and adaptation by the computational engineering community, due to the challenges introduced by complex industrial problems.Another common challenge is the need to handle complex geometries. Nowadays, it is becoming obvious that geometry should be persistent throughout the whole simulation process. Several methodologies that can carry the geometric information throughout the simulation stage are available, but due to the novelty of these methods, the generation of suitable meshes for these techniques is still the main obstacle for the industrial uptake of this technology.This book will cover different aspects of mesh generation and adaptation, with particular emphasis on cutting-edge mesh generation techniques for advanced discretisation methods and complex geometries.
This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional.
Building on the successful first and second volumes, this book is the third volume of the Springer book on the Robot Operating System (ROS): The Complete Reference. The Robot Operating System is evolving from year to year with a wealth of new contributed packages and enhanced capabilities. Further, the ROS is being integrated into various robots and systems and is becoming an embedded technology in emerging robotics platforms. The objective of this third volume is to provide readers with additional and comprehensive coverage of the ROS and an overview of the latest achievements, trends and packages developed with and for it. Combining tutorials, case studies, and research papers, the book consists of sixteen chapters and is divided into five parts. Part 1 presents multi-robot systems with the ROS. In Part 2, four chapters deal with the development of unmanned aerial systems and their applications. In turn, Part 3 highlights recent work related to navigation, motion planning and control. Part 4 discusses recently contributed ROS packages for security, ROS2, GPU usage, and real-time processing. Lastly, Part 5 deals with new interfaces allowing users to interact with robots. Taken together, the three volumes of this book offer a valuable reference guide for ROS users, researchers, learners and developers alike. Its breadth of coverage makes it a unique resource.
This book describes novel methods for network-on-chip (NoC) design, using source-synchronous high-speed resonant clocks. The authors discuss NoCs from the bottom up, providing circuit level details, before providing architectural simulations. As a result, readers will get a complete picture of how a NoC can be designed and optimized.Using the methods described in this book, readers are enabled to design NoCs that are 5X better than existing approaches in terms of latency and throughput and can also sustain a significantly greater amount of traffic." |
![]() ![]() You may like...
Linear Mixed-Effects Models Using R - A…
Andrzej Galecki, Tomasz Burzykowski
Hardcover
R4,616
Discovery Miles 46 160
Time-dependent Problems in Imaging and…
Barbara Kaltenbacher, Thomas Schuster, …
Hardcover
R4,265
Discovery Miles 42 650
Proceedings of ELM-2015 Volume 1…
Jiuwen Cao, Kezhi Mao, …
Hardcover
The Cloud DBA-Oracle - Managing Oracle…
Abhinivesh Jain, Niraj Mahajan
Paperback
R1,924
Discovery Miles 19 240
Advances in Production Management…
Alexandre Dolgui, Alain Bernard, …
Hardcover
R5,262
Discovery Miles 52 620
Examining Fractal Image Processing and…
Soumya Ranjan Nayak, Jibitesh Mishra
Hardcover
R7,219
Discovery Miles 72 190
|