0
Your cart

Your cart is empty

Price
  • R50 - R100 (4)
  • R100 - R250 (244)
  • R250 - R500 (798)
  • R500+ (8,229)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Handbook of Research on Redesigning the Future of Internet Architectures (Hardcover): Mohamed Boucadair, Christian Jacquenet Handbook of Research on Redesigning the Future of Internet Architectures (Hardcover)
Mohamed Boucadair, Christian Jacquenet
R8,649 Discovery Miles 86 490 Ships in 18 - 22 working days

As the volume of global Internet traffic increases, the Internet is beginning to suffer from a broad spectrum of performance-degrading infrastructural limitations that threaten to jeopardize the continued growth of new, innovative services. In answer to this challenge, computer scientists seek to maintain the original design principles of the Internet while allowing for a more dynamic approach to the manner in which networks are designed and operated. The Handbook of Research on Redesigning the Future of Internet Architectures covers some of the hottest topics currently being debated by the Internet community at large, including Internet governance, privacy issues, service delivery automation, advanced networking schemes, and new approaches to Internet traffic-forwarding and path-computation mechanics. Targeting students, network-engineers, and technical strategists, this book seeks to provide a broad and comprehensive look at the next wave of revolutionary ideas poised to reshape the very foundation of the Internet as we know it.

Essential Computer Hardware Second Edition - The Illustrated Guide to Understanding Computer Hardware (Hardcover): Kevin Wilson Essential Computer Hardware Second Edition - The Illustrated Guide to Understanding Computer Hardware (Hardcover)
Kevin Wilson
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
Linux - A Comprehensive Guide to Linux Operating System and Command Line (Hardcover): Sam Griffin Linux - A Comprehensive Guide to Linux Operating System and Command Line (Hardcover)
Sam Griffin
R558 R513 Discovery Miles 5 130 Save R45 (8%) Ships in 18 - 22 working days
Cloud Technology - Concepts, Methodologies, Tools, and Applications, Vol 1 (Hardcover): Irma Cloud Technology - Concepts, Methodologies, Tools, and Applications, Vol 1 (Hardcover)
Irma
R17,860 Discovery Miles 178 600 Ships in 18 - 22 working days
Auditing Information Systems (Paperback): Mario Piattini Auditing Information Systems (Paperback)
Mario Piattini
R3,545 Discovery Miles 35 450 Ships in 18 - 22 working days

Society's growing dependence on information technology for survival has elevated the importance of controlling and evaluating information systems. A sound plan for auditing information systems and the technology that supports them is a necessity for organizations to improve the IS benefits and allow the organization to manage the risks associated with technology. Auditing Information Systems gives a global vision of auditing and control, exposing the major techniques and methods. It provides guidelines for auditing the crucial areas of IT--databases, security, maintenance, quality, and communications.

Microsoft Forefront Security Administration Guide (Paperback): Jesse Varsalone Microsoft Forefront Security Administration Guide (Paperback)
Jesse Varsalone
R1,129 R878 Discovery Miles 8 780 Save R251 (22%) Ships in 10 - 15 working days

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
* First book to address securing an entire Microsoft network from Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
* Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network.

HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback): Philip Kortum HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback)
Philip Kortum
R1,247 Discovery Miles 12 470 Ships in 10 - 15 working days

As technology expands and evolves, one-dimensional, graphical user interface (GUI) design becomes increasingly limiting and simplistic. Designers must meet the challenge of developing new and creative interfaces that adapt to meet human needs and technological trends. HCI Beyond the GUI provides designers with this know how by exploring new ways to reach users that involve all of the human senses. Dr. Kortum gathers contributions from leading human factors designers to present a single reference for professionals, researchers, and students.
Explores the human factors involved in the design and implementation of the nontraditional interfaces, detailing design strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines

The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition): Anthony Piltzecker The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition)
Anthony Piltzecker
R1,281 Discovery Miles 12 810 Ships in 10 - 15 working days

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services 7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

Processor Description Languages, Volume 1 (Hardcover): Prabhat Mishra, Nikil Dutt Processor Description Languages, Volume 1 (Hardcover)
Prabhat Mishra, Nikil Dutt
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and rapid prototyping methodologies are used to find the best possible design for a given set of applications under various design constraints, such as area, power and performance.
This book is the first, comprehensive survey of modern architecture description languages and will be an invaluable reference for embedded system architects, designers, developers, and validation engineers. Readers will see that the use of particular architecture description languages will lead to productivity gains in designing particular (application-specific) types of embedded processors.
* Comprehensive coverage of all modern architecture description languages... use the right ADL to design your processor to fit your application;
* Most up-to-date information available about each architecture description language from the developers...save time chasing down reliable documentation;
* Describes how each architecture desccription language enables key design automation tasks, such as simulation, synthesis and testing...fit the ADL to your design cycle;

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Evaluating Children's Interactive Products - Principles and Practices for Interaction Designers (Paperback): Panos... Evaluating Children's Interactive Products - Principles and Practices for Interaction Designers (Paperback)
Panos Markopoulos, Janet C. Read, Stuart Macfarlane, Johanna Hoysniemi
R1,178 Discovery Miles 11 780 Ships in 10 - 15 working days

Interactive products designed for children-whether toys, games, educational products, or websites-are increasingly embedded in children's lives and school experiences. Making these products safe, effective, and entertaining requires new methodologies for carrying out sound and unbiased evaluations for these users with unique requirements, environments, and ethical considerations.
This book directly addresses this need by thoroughly covering the evaluation of all types of interactive technology for children. Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies. Essential reading for usability experts, product developers, and researchers in the field.
* Presents an essential background in child development and child psychology, particularly as they relate to technology.
* Captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology.
* Examines ethical and legal issues involved in working with children and offers guidelines for effective risk management.

Hands-On Design Patterns with Java - Learn design patterns that enable the building of large-scale software architectures... Hands-On Design Patterns with Java - Learn design patterns that enable the building of large-scale software architectures (Paperback)
Dr Edward Lavieri
R1,086 Discovery Miles 10 860 Ships in 18 - 22 working days

Understand Gang of Four, architectural, functional, and reactive design patterns and how to implement them on modern Java platforms, such as Java 12 and beyond Key Features Learn OOP, functional, and reactive patterns for creating readable and maintainable code Explore architectural patterns and practices for building scalable and reliable applications Tackle all kinds of performance-related issues and streamline development using design patterns Book DescriptionJava design patterns are reusable and proven solutions to software design problems. This book covers over 60 battle-tested design patterns used by developers to create functional, reusable, and flexible software. Hands-On Design Patterns with Java starts with an introduction to the Unified Modeling Language (UML), and delves into class and object diagrams with the help of detailed examples. You'll study concepts and approaches to object-oriented programming (OOP) and OOP design patterns to build robust applications. As you advance, you'll explore the categories of GOF design patterns, such as behavioral, creational, and structural, that help you improve code readability and enable large-scale reuse of software. You'll also discover how to work effectively with microservices and serverless architectures by using cloud design patterns, each of which is thoroughly explained and accompanied by real-world programming solutions. By the end of the book, you'll be able to speed up your software development process using the right design patterns, and you'll be comfortable working on scalable and maintainable projects of any size. What you will learn Understand the significance of design patterns for software engineering Visualize software design with UML diagrams Strengthen your understanding of OOP to create reusable software systems Discover GOF design patterns to develop scalable applications Examine programming challenges and the design patterns that solve them Explore architectural patterns for microservices and cloud development Who this book is forIf you are a developer who wants to learn how to write clear, concise, and effective code for building production-ready applications, this book is for you. Familiarity with the fundamentals of Java is assumed.

A Primer For Disaster Recovery Planning In An IT Environment (Paperback, illustrated edition): Charlotte J. Haitt A Primer For Disaster Recovery Planning In An IT Environment (Paperback, illustrated edition)
Charlotte J. Haitt
R1,762 Discovery Miles 17 620 Ships in 18 - 22 working days

Since its birth in the late 1970s, the business recovery industry has continued to broaden, moving from original batch application processing on mainframes to include recovery for telecommunications connectivity, distributed processing on mid-range systems, and most recently, network and work area recovery. Whenever accidents, disasters and natural events interrupt business activities, one thing is certain: businesses lose money. How much money often depends on how prepared companies are for dealing with business interruptions. A Primer for Disaster Recovery Planning in an IT Environment is intended to help businesses plan for an occurrence that could mean a business stoppage. It helps you evaluate your business in terms of vulnerability to disaster and guides you through the process of creating a disaster recovery plan.

Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 18 - 22 working days
VLSI High-Speed I/O Circuits (Hardcover): Hongjiang Song VLSI High-Speed I/O Circuits (Hardcover)
Hongjiang Song
R1,842 R1,723 Discovery Miles 17 230 Save R119 (6%) Ships in 10 - 15 working days
Routing Algorithms in Networks-on-Chip (Hardcover, 2014 ed.): Maurizio Palesi, Masoud Daneshtalab Routing Algorithms in Networks-on-Chip (Hardcover, 2014 ed.)
Maurizio Palesi, Masoud Daneshtalab
R4,882 Discovery Miles 48 820 Ships in 10 - 15 working days

This book provides a single-source reference to routing algorithms for Networks-on-Chip (NoCs), as well as in-depth discussions of advanced solutions applied to current and next generation, many core NoC-based Systems-on-Chip (SoCs). After a basic introduction to the NoC design paradigm and architectures, routing algorithms for NoC architectures are presented and discussed at all abstraction levels, from the algorithmic level to actual implementation. Coverage emphasizes the role played by the routing algorithm and is organized around key problems affecting current and next generation, many-core SoCs. A selection of routing algorithms is included, specifically designed to address key issues faced by designers in the ultra-deep sub-micron (UDSM) era, including performance improvement, power, energy, and thermal issues, fault tolerance and reliability.

Portable Biosensors and Point-of-Care Systems (Hardcover): Spyridon E. Kintzios Portable Biosensors and Point-of-Care Systems (Hardcover)
Spyridon E. Kintzios
R4,459 R3,998 Discovery Miles 39 980 Save R461 (10%) Ships in 18 - 22 working days

Portable Biosensors and Point-of-Care Systems describes the principles, design and applications of a new generation of analytical and diagnostic biomedical devices, characterized by their very small size, ease of use, multi-analytical capabilities and speed to provide handheld and mobile point-of-care (POC) diagnostics. The book is divided in four Parts. Part I is an in-depth analysis of the various technologies upon which portable diagnostic devices and biosensors are built. In Part II, advances in the design and optimization of special components of biosensor systems and handheld devices are presented. In Part III, a wide scope of applications of portable biosensors and handheld POC devices is described, ranging from the support of primary healthcare to food and environmental safety screening. Diverse topics are covered, including counterterrorism, travel medicine and drug development. Finally, Part IV of the book is dedicated to the presentation of commercially available products including a review of the products of point-of-care in-vitro-diagnostics companies, a review of technologies which have achieved a high Technology Readiness Level, and a special market case study of POC infusion systems combined with intelligent patient monitoring. This book is essential reading for researchers and experts in the healthcare diagnostic and analytical sector, and for electronics and material engineers working on portable sensors.

How to Cheat at Configuring VmWare ESX Server (Paperback): David Rule How to Cheat at Configuring VmWare ESX Server (Paperback)
David Rule
R1,084 R842 Discovery Miles 8 420 Save R242 (22%) Ships in 10 - 15 working days

A virtual evolution in IT shops large and small has begun. VMware s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMware s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz
This book will detail the default and custom installation of VMware s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual machine s root partition from the original clone size to a larger size."

The Best Damn Exchange, SQL and IIS Book Period (Paperback): Henrik Walther, Mark Horninger, Chris Adams The Best Damn Exchange, SQL and IIS Book Period (Paperback)
Henrik Walther, Mark Horninger, Chris Adams
R1,220 Discovery Miles 12 200 Ships in 10 - 15 working days

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management.
The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers.
Key Features:
* All-in-one coverage includes Exchange, SQL, and IIS Servers
* Integrated coverage on all key security features
* Bonus coverage includes analyzing server logs and integrating Communicator 2007

Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019): Mauri Kaipainen, Frank Zenker, Antti Hautamaki,... Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019)
Mauri Kaipainen, Frank Zenker, Antti Hautamaki, Peter Gardenfors
R3,112 Discovery Miles 31 120 Ships in 18 - 22 working days

This edited book focuses on concepts and their applications using the theory of conceptual spaces, one of today's most central tracks of cognitive science discourse. It features 15 papers based on topics presented at the Conceptual Spaces @ Work 2016 conference. The contributors interweave both theory and applications in their papers. Among the first mentioned are studies on metatheories, logical and systemic implications of the theory, as well as relations between concepts and language. Examples of the latter include explanatory models of paradigm shifts and evolution in science as well as dilemmas and issues of health, ethics, and education. The theory of conceptual spaces overcomes many translational issues between academic theoretization and practical applications. The paradigm is mainly associated with structural explanations, such as categorization and meronomy. However, the community has also been relating it to relations, functions, and systems. The book presents work that provides a geometric model for the representation of human conceptual knowledge that bridges the symbolic and the sub-conceptual levels of representation. The model has already proven to have a broad range of applicability beyond cognitive science and even across a number of disciplines related to concepts and representation.

Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and... Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and Transmission (Hardcover)
R. Manjunath
R4,567 Discovery Miles 45 670 Ships in 18 - 22 working days

Digital signal processing is now a growing area of study invading all walks of organizational life, from consumer products to database management. ""Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission"" presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R4,654 Discovery Miles 46 540 Ships in 10 - 15 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback): William Jones Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback)
William Jones
R1,357 Discovery Miles 13 570 Ships in 10 - 15 working days

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" of an office or on the hard drive of a computer. Instead, information may be controlling us - keeping us from doing the things we need to do, getting us to waste money and precious time. The growth of available information, plus the technologies for its creation, storage, retrieval, distribution and use, is astonishing and sometimes bewildering. Can there be a similar growth in our understanding for how best to manage information and informational tools?
This book provides a comprehensive overview of personal information management (PIM) as both a study and a practice of the activities people do and need to be doing so that information can work for them in their daily lives.
Introductory chapters of "Keeping Found Things Found: The Study and Practice of Personal Information Management" provide an overview of PIM and a sense for its many facets. The next chapters look more closely at the essential challenges of PIM, including finding, keeping, organizing, maintaining, managing privacy, and managing information flow. The book also contains chapters on search, email, mobile PIM, web-based support, and other technologies relevant to PIM.
*For more information and author blog visit http: //www.keepingthingsfound.com/.
* Focuses exclusively on one of the most interesting and challenging problems in today's world
* Explores what good and better PIM looks like, and how to measure improvements
* Presents key questions to consider when evaluating any new PIM informational tools or systems

A Hobbyist's Guide to THEC64 Mini (Hardcover, Collector's ed.): Holger Wessling A Hobbyist's Guide to THEC64 Mini (Hardcover, Collector's ed.)
Holger Wessling
R796 Discovery Miles 7 960 Ships in 10 - 15 working days
Evolution and Standardization of Mobile Communications Technology (Hardcover, New): DongBack Seo Evolution and Standardization of Mobile Communications Technology (Hardcover, New)
DongBack Seo
R4,888 Discovery Miles 48 880 Ships in 18 - 22 working days

Information and communication technologies (ICT) are a vital component of successful business models. As new technologies emerge, organizations must adapt quickly and strategically to these changes or risk falling behind. Evolution and Standardization of Mobile Communications Technology examines methods of developing and regulating compatibility standards in the ICT industry, assisting organizations in their application of the latest communications technologies in their business practices. Organizations maintain competitive advantage by implementing cutting-edge technologies as soon as they appear. This book serves as a compendium of the most recent research and development in this arena, providing readers with the insight necessary to take full advantage of a wide range of ICT solutions. This book is part of the Advances in IT Standards and Standardization Research series collection.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Media Ownership and Concentration in…
Eli M. Noam Hardcover R3,786 Discovery Miles 37 860
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R229 Discovery Miles 2 290
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810
A Hobbyist's Guide to THEA500 Mini
Holger Wessling Hardcover R929 Discovery Miles 9 290
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R895 R773 Discovery Miles 7 730

 

Partners