0
Your cart

Your cart is empty

Price
  • R50 - R100 (4)
  • R100 - R250 (244)
  • R250 - R500 (797)
  • R500+ (8,217)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Toward Solving Complex Human Problems - Techniques for Increasing Our Understanding of What Matters in Doing So (Paperback):... Toward Solving Complex Human Problems - Techniques for Increasing Our Understanding of What Matters in Doing So (Paperback)
Brian E. White
R638 Discovery Miles 6 380 Ships in 10 - 15 working days

This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.

Disruptive Developments in Biomedical Applications (Hardcover): Swati V. Shinde, Parikshit N. Mahalle, Varsha Bendre, Oscar... Disruptive Developments in Biomedical Applications (Hardcover)
Swati V. Shinde, Parikshit N. Mahalle, Varsha Bendre, Oscar Castillo
R4,797 Discovery Miles 47 970 Ships in 10 - 15 working days

Covers different technologies like AI, IoT and Signal Processing in the context of biomedical applications Reviews medical image analysis, disease detection, and prediction Comprehends the advantage of recent technologies for medical record keeping through electronics health records (EHRs) Presents state of art research in the field of biomedical engineering using various physiological signals Explores different Bio Sensors used in Healthcare Applications using IoT

Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities (Hardcover, 1st ed. 2023): Mohd Abdul... Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities (Hardcover, 1st ed. 2023)
Mohd Abdul Ahad, Gabriella Casalino, Bharat Bhushan
R4,636 Discovery Miles 46 360 Ships in 10 - 15 working days

With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society's future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferred with the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.

Mobile Security and Privacy - Advances, Challenges and Future Research Directions (Paperback): Man-Ho Au, Raymond Choo Mobile Security and Privacy - Advances, Challenges and Future Research Directions (Paperback)
Man-Ho Au, Raymond Choo
R1,941 Discovery Miles 19 410 Ships in 10 - 15 working days

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.

Parallel Language and Compiler Research in Japan (Hardcover, 1995 ed.): Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato Parallel Language and Compiler Research in Japan (Hardcover, 1995 ed.)
Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato
R5,431 Discovery Miles 54 310 Ships in 18 - 22 working days

Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.

Advanced Methods of Pharmacokinetic and Pharmacodynamic Systems Analysis (Hardcover, 2004 ed.): David D'Argenio Advanced Methods of Pharmacokinetic and Pharmacodynamic Systems Analysis (Hardcover, 2004 ed.)
David D'Argenio
R5,315 Discovery Miles 53 150 Ships in 18 - 22 working days

Advanced Methods of Pharmacokinetic and Pharmocodynamic Systems Analysis Volume 3 is vital to professionals and academicians working in drug development and bioengineering. Both basic and clinical scientists will benefit from this work.
This book contains chapters by leading researchers in pharmacokinetic/pharmacodynamic modeling and will be of interest to anyone involved with the application of pharmacokinetic and pharmacodynamics to drug development.
The use of mathematical modeling and associated computational methods is central to the study of the absorption, distribution and elimination of therapeutic drugs (pharmacokinetics) and to understanding how drugs produce their effects (pharmacodynamics). From its inception, the field of pharmacokinetics and pharmacodynamics has incorporated methods of mathematical modeling, simulation and computation in an effort to better understand and quantify the processes of uptake, disposition and action of therapeutic drugs. These methods for pharmacokinetic/pharmacodynamic systems analysis impact all aspects of drug development. In vitro, animal and human testing, as well as drug therapy are all influenced by these methods. Modeling methodologies developed for studying pharmacokinetic/ pharmacodynamic processes confront many challenges. This is related in part to the severe restrictions on the number and type of measurements that are available from laboratory experiments and clinical trials, as well as the variability in the experiments and the uncertainty associated with the processes themselves.
The contributions are organized in three main areas: Mechanism-Based PK/PD, Pharmacometrics and Pharmacotherapy. Both professionals andacademics will profit from this extensive work.

Navigation Design and SEO for Content-Intensive Websites - A Guide for an Efficient Digital Communication (Paperback): Mario... Navigation Design and SEO for Content-Intensive Websites - A Guide for an Efficient Digital Communication (Paperback)
Mario Perez-Montoro, Lluis Codina
R1,448 Discovery Miles 14 480 Ships in 10 - 15 working days

Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.

Big Data - Principles and Paradigms (Paperback): Rajkumar Buyya, Rodrigo N. Calheiros, Amir Vahid Dastjerdi Big Data - Principles and Paradigms (Paperback)
Rajkumar Buyya, Rodrigo N. Calheiros, Amir Vahid Dastjerdi
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data's full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.

Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,361 Discovery Miles 33 610 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback)
Steve King; Edited by Kiren Chaudry
R979 Discovery Miles 9 790 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Introduction to Open Core Protocol - Fastpath to System-on-Chip Design (Hardcover, 2012): W.David Schwaderer Introduction to Open Core Protocol - Fastpath to System-on-Chip Design (Hardcover, 2012)
W.David Schwaderer
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."

System Verification - Proving the Design Solution Satisfies the Requirements (Paperback, 2nd edition): Jeffrey O. Grady System Verification - Proving the Design Solution Satisfies the Requirements (Paperback, 2nd edition)
Jeffrey O. Grady
R2,095 Discovery Miles 20 950 Ships in 10 - 15 working days

System Verification: Proving the Design Solution Satisfies the Requirements, Second Edition explains how to determine what verification work must be done, how the total task can be broken down into verification tasks involving six straightforward methods, how to prepare a plan, procedure, and report for each of these tasks, and how to conduct an audit of the content of those reports for a particular product entity. This process-centered book is applicable to engineering and computing projects of all kinds, and the lifecycle approach helps all stakeholders in the design process understand how the verification and validation stage is significant to them. In addition to many flowcharts that illustrate the verification procedures involved, the book also includes 14 verification form templates for use in practice. The author draws on his experience of consulting for industry as well as lecturing to provide a uniquely practical and easy to use guide which is essential reading for systems and validation engineers, as well as everyone involved in the product design process.

Multi-Criteria Decision Models in Software Reliability - Methods and Applications (Hardcover): Ashish Mishra, Nguyen Thi Dieu... Multi-Criteria Decision Models in Software Reliability - Methods and Applications (Hardcover)
Ashish Mishra, Nguyen Thi Dieu Linh, Manish Bhardwaj, Carla M. A. Pinto
R4,086 Discovery Miles 40 860 Ships in 10 - 15 working days

This book provides insights into contemporary issues and challenges in multi-criteria decision models. It is a useful guide for identifying, understanding and categorising multi-criteria decision models, and ultimately implementing the analysis for effective decision-making. The use of multi-criteria decision models in software reliability engineering is a relatively new field of study, and this book collects all the latest methodologies, tools and techniques in one single volume. It covers model selection, assessment, resource allocation, release management, up-grade planning, open-source systems, bug tracking system management and defect prediction. Multi-Criteria Decision Models in Software Reliability: Methods and Applications will cater to researchers, academicians, post-graduate students, software developers, software reliability engineers and IT managers.

Microprocessor Architectures - From VLIW to TTA (Hardcover, New): H Corporaal Microprocessor Architectures - From VLIW to TTA (Hardcover, New)
H Corporaal
R6,367 Discovery Miles 63 670 Ships in 18 - 22 working days

Exploring new trends in computer technology, Corporal introduces an innovative and exciting concept: Transport Triggered Architecture (TTAs). Unlike most traditional architectures, where programmed operations trigger internal data transports, TTAs function through programming the data transports themselves. As a result the new architecture alleviates bottlenecks, allows for new code-generation optimizations and exploits hardware more efficiently. Founded on the author’s recent research, this book evaluates the attributes of different classes of architectures. It demonstrates how TTAs can be used as a template for automatic generation of application-specific processors and highlights their suitability for embedded system design. Several commercial TTA implementations have proven its concepts and advantages.

Features includes:

  • Complexity analysis of the data path of Instruction Level Parallel processors, particularly of VLIW (Very Long Instruction Word) and super-pipelined processors
  • Derivation of the transport triggering concept illustrating processor simplification
  • In-depth analysis of the architecture design space of TTAs and evaluation of architecture parameters
  • Examination of the control and pipelining of instruction, function and register units
  • Description of a trajectory for the automatic synthesis of TTAs for arbitrary applications written in a high-level language
  • Detailed description of a prototype TTA processor enabling the reader to design an embedded computer system with excellent cost-performance ratio

Microprocessor Architectures is cutting-edge text which will prove invaluable to both industrial hardware and software engineers involved in embedded system design and to postgraduate electrical engineering and computer science students. This clearly-structured reference demonstrates the versatility of TTAs and explores their influential role in the next generation of computer architecture.

Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback): Carl Young Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback)
Carl Young
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Electromagnetic Information Leakage and Countermeasure Technique - Translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao... Electromagnetic Information Leakage and Countermeasure Technique - Translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao (Hardcover, 1st ed. 2019)
Taikang Liu, Yongmei Li
R3,992 Discovery Miles 39 920 Ships in 10 - 15 working days

This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.

Mac Basics In Simple Steps (Paperback, 2nd edition): Tom Myer Mac Basics In Simple Steps (Paperback, 2nd edition)
Tom Myer
R339 R306 Discovery Miles 3 060 Save R33 (10%) Ships in 10 - 15 working days

Discover everything you want to know about Mac basics in this easy-to-use guide, from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.

Executing Windows Command Line Investigations - While Ensuring Evidentiary Integrity (Paperback): Chet Hosmer, Joshua... Executing Windows Command Line Investigations - While Ensuring Evidentiary Integrity (Paperback)
Chet Hosmer, Joshua Bartolomie, Rosanne Pelli
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

Artificial Intelligence Perspective for Smart Cities (Paperback): Sezer Bozkus Kahyaoglu, Vahap Tecim Artificial Intelligence Perspective for Smart Cities (Paperback)
Sezer Bozkus Kahyaoglu, Vahap Tecim
R1,136 Discovery Miles 11 360 Ships in 10 - 15 working days

1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.

Emerging Technologies for Combatting Pandemics - AI, IoMT, and Analytics (Hardcover): M.Rubaiyat Hossain Mondal, Utku Kose,... Emerging Technologies for Combatting Pandemics - AI, IoMT, and Analytics (Hardcover)
M.Rubaiyat Hossain Mondal, Utku Kose, V.B. Surya Prasath, Prajoy Podder, Subrato Bharati, …
R3,662 Discovery Miles 36 620 Ships in 10 - 15 working days

Unique selling point: The Internet of Things (IoT), AI, and analytics are studied on how they can combat pandemics Core audience: Researchers and medical informatics professionals Place in the market: Academic reference title on timely topic also appealing to professionals

Advances in Mobile Health Technology - A Research Perspective (Hardcover): Sinjini Mitra Advances in Mobile Health Technology - A Research Perspective (Hardcover)
Sinjini Mitra
R3,638 Discovery Miles 36 380 Ships in 10 - 15 working days

The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.

Advances in Mobile Health Technology - A Research Perspective (Paperback): Sinjini Mitra Advances in Mobile Health Technology - A Research Perspective (Paperback)
Sinjini Mitra
R1,454 Discovery Miles 14 540 Ships in 10 - 15 working days

The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.

Foundations of Quantum Programming (Paperback): Mingsheng Ying Foundations of Quantum Programming (Paperback)
Mingsheng Ying
R2,448 Discovery Miles 24 480 Ships in 10 - 15 working days

Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.

Internet of Things for Agriculture 4.0 - Impact and Challenges (Hardcover): Rajesh Singh, Anita Gehlot, Amit Kumar Thakur, Ajay... Internet of Things for Agriculture 4.0 - Impact and Challenges (Hardcover)
Rajesh Singh, Anita Gehlot, Amit Kumar Thakur, Ajay Kumar Kaviti
R3,820 Discovery Miles 38 200 Ships in 10 - 15 working days

This new book provides an insightful look at the varied and exciting uses and applications of Wi-Fi and the Internet of Things in agriculture. With internet-enabled communications becoming more widely available, farms and agricultural establishments can take advantage of these new technologies for a wide range of farm operations, such as crop management, farm vehicle tracking, livestock monitoring, storage monitoring, and more. The collected data from these devices can be stored in the cloud system or server and accessed by the farmers via the internet or mobile phones. This book shows the many benefits to farmers from applying IoT, including better utilizing information for monitoring crops, optimizing water use, planning effective fertilization strategies, and saving time and reducing the operation expenses. Topics include using IoT for vertical farming, IoT-based smart irrigation system, landslide susceptibility assessment, automated aeroponics systems, crop survival analysis, and more. The volume also considers the challenges of IoT in agriculture, such as the requirements of applications of wireless sensor networks, the threat of attacks and the detection of vulnerabilities in wireless sensor networks, and more. Internet of Things for Agriculture 4.0: Impact and Challenges provides a better understanding of the time- and resourcing-saving benefits of wireless sensors and remote monitoring devices in agriculture. The volume will be useful for those involved in agricultural operations as well as scientists and researchers, and faculty and students in agriculture and computer and information science engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Water of Life, and Other Sermons
Charles Kingsley Paperback R536 Discovery Miles 5 360
The Complete Ninja Foodi XL Pro Air…
Mark Thornburg Hardcover R648 Discovery Miles 6 480
Micro-Enterprises in Agriculture
M.S. Virdi Hardcover R1,483 Discovery Miles 14 830
Star Lore of All Ages
William Tyler Olcott Hardcover R1,077 Discovery Miles 10 770
Keto Diet Cookbook - An Easy Guide To…
Anne Spencer Hardcover R838 R737 Discovery Miles 7 370
Radiative Properties of Semiconductors
N.M. Ravindra Paperback R753 Discovery Miles 7 530
Air Fryer Cookbook - 600 Effortless Air…
Jenson William Hardcover R783 Discovery Miles 7 830
Severe Plastic Deformation Techniques
Marcello Cabibbo Hardcover R3,107 Discovery Miles 31 070
Township Violence And The End Of…
Gary Kynoch Paperback R350 R323 Discovery Miles 3 230
The Complete Pit Boss Wood Pellet Grill…
Brandon Smith Hardcover R763 Discovery Miles 7 630

 

Partners