0
Your cart

Your cart is empty

Price
  • R50 - R100 (7)
  • R100 - R250 (240)
  • R250 - R500 (797)
  • R500+ (8,196)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,358 Discovery Miles 33 580 Ships in 18 - 22 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback)
Shaun Aghili
R1,196 Discovery Miles 11 960 Ships in 10 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

High Performance Computing and the Discrete Element Model - Opportunity and Challenge (Hardcover): Gao-Feng  Zhao High Performance Computing and the Discrete Element Model - Opportunity and Challenge (Hardcover)
Gao-Feng Zhao
R2,316 Discovery Miles 23 160 Ships in 10 - 15 working days

This book addresses the high performance computing of the Discrete Element Model (DEM). It is a comprehensive presentation of parallel implementation of the DEM on three popular parallel computing platforms; the multi-core PC, the GPU computer, and the cluster supercomputer. Featuring accompanying MatLab source this book helps you implement the DEM model for use with high performing technology, for particular implementation of the dynamic failure of solids, granular flow and stress wave propagation through solids.

Algorithms and Parallel VLSI Architectures III (Hardcover): M. Moonen, F. Catthoor Algorithms and Parallel VLSI Architectures III (Hardcover)
M. Moonen, F. Catthoor
R6,689 Discovery Miles 66 890 Ships in 10 - 15 working days

A comprehensive overview of the current evolution of research in algorithms, architectures and compilation for parallel systems is provided by this publication.

The contributions focus specifically on domains where embedded systems are required, either oriented to application-specific or to programmable realisations. These are crucial in domains such as audio, telecom, instrumentation, speech, robotics, medical and automotive processing, image and video processing, TV, multimedia, radar and sonar.

The book will be of particular interest to the academic community because of the detailed descriptions of research results presented. In addition, many contributions feature the "real-life" applications that are responsible for driving research and the impact of their specific characteristics on the methodologies is assessed.

The publication will also be of considerable value to senior design engineers and CAD managers in the industrial arena, who wish either to anticipate the evolution of commercially available design tools or to utilize the presented concepts in their own R&D programmes.

Magnetic Disk Drive Technology - Heads, Media, Channel, Interfaces & Integration (Hardcover): KG Ashar Magnetic Disk Drive Technology - Heads, Media, Channel, Interfaces & Integration (Hardcover)
KG Ashar
R4,655 Discovery Miles 46 550 Ships in 18 - 22 working days

This book will take you from basic academic knowledge about magnetics to a proficient understanding of the most recent advances in the technology. This book offers the latest information about disk technology, including: the fundamentals of magnetics, MIG heads, thin film heads, magnetoresistive heads, thin film media, electrical and mechanical integration of these components into a drive, and how to record writing and reading processes magnetically. You'll also learn about giant magnetoresistance, contact recording, and future disk drive industry developments. MAGNETIC DISK DRIVE TECHNOLOGY is an excellent guide for practitioners, researchers, and recent graduate engineers in the field of magnetics.

Knowledge Guided Machine Learning - Accelerating Discovery using Scientific Knowledge and Data (Hardcover): Anuj Karpatne,... Knowledge Guided Machine Learning - Accelerating Discovery using Scientific Knowledge and Data (Hardcover)
Anuj Karpatne, Ramakrishnan Kannan, Vipin Kumar
R3,113 Discovery Miles 31 130 Ships in 10 - 15 working days

Given their tremendous success in commercial applications, machine learning (ML) models are increasingly being considered as alternatives to science-based models in many disciplines. Yet, these "black-box" ML models have found limited success due to their inability to work well in the presence of limited training data and generalize to unseen scenarios. As a result, there is a growing interest in the scientific community on creating a new generation of methods that integrate scientific knowledge in ML frameworks. This emerging field, called scientific knowledge-guided ML (KGML), seeks a distinct departure from existing "data-only" or "scientific knowledge-only" methods to use knowledge and data at an equal footing. Indeed, KGML involves diverse scientific and ML communities, where researchers and practitioners from various backgrounds and application domains are continually adding richness to the problem formulations and research methods in this emerging field. Knowledge Guided Machine Learning: Accelerating Discovery using Scientific Knowledge and Data provides an introduction to this rapidly growing field by discussing some of the common themes of research in KGML using illustrative examples, case studies, and reviews from diverse application domains and research communities as book chapters by leading researchers. KEY FEATURES First-of-its-kind book in an emerging area of research that is gaining widespread attention in the scientific and data science fields Accessible to a broad audience in data science and scientific and engineering fields Provides a coherent organizational structure to the problem formulations and research methods in the emerging field of KGML using illustrative examples from diverse application domains Contains chapters by leading researchers, which illustrate the cutting-edge research trends, opportunities, and challenges in KGML research from multiple perspectives Enables cross-pollination of KGML problem formulations and research methods across disciplines Highlights critical gaps that require further investigation by the broader community of researchers and practitioners to realize the full potential of KGML

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,790 Discovery Miles 27 900 Ships in 10 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Introduction to Engineering and Scientific Computing with Python (Hardcover): David E. Clough, Steven C. Chapra Introduction to Engineering and Scientific Computing with Python (Hardcover)
David E. Clough, Steven C. Chapra
R3,112 Discovery Miles 31 120 Ships in 10 - 15 working days

1) Provides a levelling approach, bringing students at all stages of programming experience to the same point 2) Focuses Python, a general language, to an engineering and scientific context 3) Uses a classroom tested, practical approach to teaching programming 4) Teaches students and professionals how to use Python to solve engineering calculations such as differential and algebraic equations

Workflow Scheduling on Computing Systems (Hardcover): Kenli Li, Xiaoyong Tang, Jing Mei, Longxin Zhang, Wangdong Yang, Keqin Li Workflow Scheduling on Computing Systems (Hardcover)
Kenli Li, Xiaoyong Tang, Jing Mei, Longxin Zhang, Wangdong Yang, …
R2,582 Discovery Miles 25 820 Ships in 10 - 15 working days

This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems' workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems' energy consumption, reliability, resource utilization, cost, and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets, this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design, management, and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure.

Compiling Algorithms for Heterogeneous Systems (Hardcover): Steven Bell, Jing Pu, James Hegarty, Mark Horowitz Compiling Algorithms for Heterogeneous Systems (Hardcover)
Steven Bell, Jing Pu, James Hegarty, Mark Horowitz
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days

Most emerging applications in imaging and machine learning must perform immense amounts of computation while holding to strict limits on energy and power. To meet these goals, architects are building increasingly specialized compute engines tailored for these specific tasks. The resulting computer systems are heterogeneous, containing multiple processing cores with wildly different execution models. Unfortunately, the cost of producing this specialized hardware-and the software to control it-is astronomical. Moreover, the task of porting algorithms to these heterogeneous machines typically requires that the algorithm be partitioned across the machine and rewritten for each specific architecture, which is time consuming and prone to error. Over the last several years, the authors have approached this problem using domain-specific languages (DSLs): high-level programming languages customized for specific domains, such as database manipulation, machine learning, or image processing. By giving up generality, these languages are able to provide high-level abstractions to the developer while producing high-performance output. The purpose of this book is to spur the adoption and the creation of domain-specific languages, especially for the task of creating hardware designs. In the first chapter, a short historical journey explains the forces driving computer architecture today. Chapter 2 describes the various methods for producing designs for accelerators, outlining the push for more abstraction and the tools that enable designers to work at a higher conceptual level. From there, Chapter 3 provides a brief introduction to image processing algorithms and hardware design patterns for implementing them. Chapters 4 and 5 describe and compare Darkroom and Halide, two domain-specific languages created for image processing that produce high-performance designs for both FPGAs and CPUs from the same source code, enabling rapid design cycles and quick porting of algorithms. The final section describes how the DSL approach also simplifies the problem of interfacing between application code and the accelerator by generating the driver stack in addition to the accelerator configuration. This book should serve as a useful introduction to domain-specialized computing for computer architecture students and as a primer on domain-specific languages and image processing hardware for those with more experience in the field.

Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover):... Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover)
Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhry
R3,373 Discovery Miles 33 730 Ships in 18 - 22 working days

This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,784 Discovery Miles 37 840 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,357 Discovery Miles 43 570 Ships in 10 - 15 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Futuristic Research Trends and Applications of Internet of Things (Hardcover): Bhawana Rudra, Anshul Verma, Shekhar Verma,... Futuristic Research Trends and Applications of Internet of Things (Hardcover)
Bhawana Rudra, Anshul Verma, Shekhar Verma, Bhanu Shrestha
R3,518 Discovery Miles 35 180 Ships in 10 - 15 working days

The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making... Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making (Hardcover, 1st ed. 2021)
Iqbal Sarker, Alan Colman, Jun Han, Paul Watters
R3,782 Discovery Miles 37 820 Ships in 18 - 22 working days

This book offers a clear understanding of the concept of context-aware machine learning including an automated rule-based framework within the broad area of data science and analytics, particularly, with the aim of data-driven intelligent decision making. Thus, we have bestowed a comprehensive study on this topic that explores multi-dimensional contexts in machine learning modeling, context discretization with time-series modeling, contextual rule discovery and predictive analytics, recent-pattern or rule-based behavior modeling, and their usefulness in various context-aware intelligent applications and services. The presented machine learning-based techniques can be employed in a wide range of real-world application areas ranging from personalized mobile services to security intelligence, highlighted in the book. As the interpretability of a rule-based system is high, the automation in discovering rules from contextual raw data can make this book more impactful for the application developers as well as researchers. Overall, this book provides a good reference for both academia and industry people in the broad area of data science, machine learning, AI-Driven computing, human-centered computing and personalization, behavioral analytics, IoT and mobile applications, and cybersecurity intelligence.

Microarchitecture of Network-on-Chip Routers - A Designer's Perspective (Hardcover, 2015 ed.): Giorgos Dimitrakopoulos,... Microarchitecture of Network-on-Chip Routers - A Designer's Perspective (Hardcover, 2015 ed.)
Giorgos Dimitrakopoulos, Anastasios Psarras, Ioannis Seitanidis
R3,956 Discovery Miles 39 560 Ships in 10 - 15 working days

This book provides a unified overview of network-on-chip router micro-architecture, the corresponding design opportunities and challenges, and existing solutions to overcome these challenges. The discussion focuses on the heart of a NoC, the NoC router, and how it interacts with the rest of the system. Coverage includes both basic and advanced design techniques that cover the entire router design space including router organization, flow control, pipelined operation, buffering architectures, as well as allocators' structure and algorithms. Router micro-architectural options are presented in a step-by-step manner beginning from the basic design principles. Even highly sophisticated design alternatives are categorized and broken down to simpler pieces that can be understood easily and analyzed. This book is an invaluable reference for system, architecture, circuit, and EDA researchers and developers, who are interested in understanding the overall picture of NoC routers' architecture, the associated design challenges, and the available solutions.

Computer Logic - Design Principles and Applications (Hardcover, 2002 ed.): John Y. Hsu Computer Logic - Design Principles and Applications (Hardcover, 2002 ed.)
John Y. Hsu
R1,581 Discovery Miles 15 810 Ships in 18 - 22 working days

An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications. Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.

Machine Learning for Edge Computing - Frameworks, Patterns and Best Practices (Hardcover): Amitoj Singh, Vinay Kukreja, Taghi... Machine Learning for Edge Computing - Frameworks, Patterns and Best Practices (Hardcover)
Amitoj Singh, Vinay Kukreja, Taghi Javdani Gandomani
R2,791 Discovery Miles 27 910 Ships in 10 - 15 working days

Introduces edge computing, hardware for edge computing AI, edge virtualization techniques Explores edge intelligence and deep learning applications, training and optimization Explains machine learning algorithms for edge Reviews AI on IoT Discusses future edge computing needs

Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Hardcover): Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa... Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Hardcover)
Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa Liao
R6,376 Discovery Miles 63 760 Ships in 10 - 15 working days

the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,461 Discovery Miles 24 610 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,776 Discovery Miles 57 760 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback)
Mai Helmy Shaheen
R1,440 Discovery Miles 14 400 Ships in 10 - 15 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Software-Defined Networking for Future Internet Technology - Concepts and Applications (Hardcover): Kshira Sagar Sahoo,... Software-Defined Networking for Future Internet Technology - Concepts and Applications (Hardcover)
Kshira Sagar Sahoo, Bibhudatta Sahoo, Brojo Kishore Mishra
R3,633 Discovery Miles 36 330 Ships in 10 - 15 working days

Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. The book demonstrates the many benefits of SDN, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. Chapters in the volume address: Design considerations for security issues and detection methods State-of-the-art approaches for mitigating DDos attacks using SDN Big data using Apache Hadoop for processing and analyzing large amounts of data Different tools used for attack simulation Network policies and policy management approaches that are widely used in the context of SDN Dynamic flow tables, or static flow table management A new four-tiered architecture that includes cloud, SDN-controller, and fog computing Architecture for keeping computing resources available near the industrial IoT network through edge computing The impact of SDN as an innovative approach for smart city development More. The book will be a valuable resource for SDN researchers as well as academicians, research scholars, and students in the related areas.

Applications of Machine Learning in Big-Data Analytics and Cloud Computing (Hardcover): Subhendu Kumar Pani, Somanath Tripathy,... Applications of Machine Learning in Big-Data Analytics and Cloud Computing (Hardcover)
Subhendu Kumar Pani, Somanath Tripathy, George Jandieri, Sumit Kundu, Talal Ashraf Butt
R2,857 Discovery Miles 28 570 Ships in 10 - 15 working days

Cloud Computing and Big Data technologies have become the new descriptors of the digital age. The global amount of digital data has increased more than nine times in volume in just five years and by 2030 its volume may reach a staggering 65 trillion gigabytes. This explosion of data has led to opportunities and transformation in various areas such as healthcare, enterprises, industrial manufacturing and transportation. New Cloud Computing and Big Data tools endow researchers and analysts with novel techniques and opportunities to collect, manage and analyze the vast quantities of data. In Cloud and Big Data Analytics, the two areas of Swarm Intelligence and Deep Learning are a developing type of Machine Learning techniques that show enormous potential for solving complex business problems. Deep Learning enables computers to analyze large quantities of unstructured and binary data and to deduce relationships without requiring specific models or programming instructions. This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics. The book will serve as a reference for Data Scientists, systems architects, developers, new researchers and graduate level students in Computer and Data science. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Canon EOS 5D Mark IV Camera User Guide…
Mike Jacobs Paperback R249 R75 Discovery Miles 750
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R229 Discovery Miles 2 290
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R431 R271 Discovery Miles 2 710
Learn Quantum Computing with Python and…
Robert Loredo Paperback R1,022 Discovery Miles 10 220
Formal and Adaptive Methods for…
Anatoliy Doroshenko, Olena Yatsenko Hardcover R5,333 Discovery Miles 53 330
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang Paperback R2,606 Discovery Miles 26 060
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R558 R512 Discovery Miles 5 120
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin Paperback R2,896 Discovery Miles 28 960
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910

 

Partners