0
Your cart

Your cart is empty

Price
  • R50 - R100 (4)
  • R100 - R250 (244)
  • R250 - R500 (798)
  • R500+ (8,226)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

See MIPS Run (Paperback, 2nd edition): Dominic Sweetman See MIPS Run (Paperback, 2nd edition)
Dominic Sweetman
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a baseline (the 1st edition used the R3000) from which to compare all other versions of the architecture and assumes that MIPS64 is the main option. The second part is a significant change from the first edition. It provides concrete examples of operating system low level code, by using Linux as the example operating system. It describes how Linux is built on the foundations the MIPS hardware provides and summarizes the Linux application environment, describing the libraries, kernel device-drivers and CPU-specific code. It then digs deep into application code and library support, protection and memory management, interrupts in the Linux kernel and multiprocessor Linux.
Sweetman has revised his best-selling MIPS bible for MIPS programmers, embedded systems designers, developers and programmers, who need an in-depth understanding of the MIPS architecture and specific guidance for writing software for MIPS-based systems, which are increasingly Linux-based.
* Completely new material offers the best explanation available on how Linux runs on real hardware.
* Provides a complete, updated and easy-to-use guide to the MIPS instruction set using the MIPS32 standard as the baseline architecture with the MIPS64 as the main option.
* Retains the same engaging writing style that made the first edition so readable, reflecting the authors 20+ years experience in designing systems based on the MIPS architecture."

CD and DVD Forensics (Paperback): Paul Crowley CD and DVD Forensics (Paperback)
Paul Crowley
R998 Discovery Miles 9 980 Ships in 10 - 15 working days

CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has just begun to blossom.
CD and DVD Forensics is a how to book that will give the reader tools to be able to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, law enforcement, corporate security, and private investigators will be able to be more effective in their evidence related tasks. To accomplish this the book is divided into four basic parts: (a) CD and DVD physics dealing with the history, construction and technology of CD and DVD media, (b) file systems present on CDs and DVDs and how these are different from that which is found on hard disks, floppy disks and other media, (c) considerations for handling CD and DVD evidence to both recover the maximum amount of information present on a disc and to do so without destroying or altering the disc in any way, and (d) using the InfinaDyne product CD/DVD Inspector to examine discs in detail and collect evidence.
*This is the first book addressing using the CD/DVD Inspector product in a hands-on manner with a complete step-by-step guide for examining evidence discs
* See how to open CD's and DVD'd and extract all the crucial evidence they may contain
* Included free is a trial version of author's market leading software "CD/DVD Inspector"

Customizable Embedded Processors, Volume . - Design Technologies and Applications (Hardcover): Paolo Ienne, Rainer Leupers Customizable Embedded Processors, Volume . - Design Technologies and Applications (Hardcover)
Paolo Ienne, Rainer Leupers
R1,627 Discovery Miles 16 270 Ships in 10 - 15 working days

Customizable processors have been described as the next natural step in the evolution of the microprocessor business: a step in the life of a new technology where top performance alone is no longer sufficient to guarantee market success. Other factors become fundamental, such as time to market, convenience, energy efficiency, and ease of customization.
This book is the first to explore comprehensively one of the most fundamental trends which emerged in the last decade: to treat processors not as rigid, fixed entities, which designers include "as is" in their products; but rather, to build sound methodologies to tailor-fit processors to the specific needs of such products. This book addresses the goal of maintaining a very large family of processors, with a wide range of features, at a cost comparable to that of maintaining a single processor.
- First book to present comprehensively the major ASIP design methodologies and tools without any particular bias.
- Written by most of the pioneers and top international experts of this young domain.
- Unique mix of management perspective, technical detail, research outlook, and practical implementation.

Networks on Chips - Technology and Tools (Hardcover): Giovanni De Micheli Networks on Chips - Technology and Tools (Hardcover)
Giovanni De Micheli; Edited by Luca Benini; Contributions by Davide Bertozzi, Israel Cidon, Kees Goossens, …
R1,674 Discovery Miles 16 740 Ships in 10 - 15 working days

The design of today's semiconductor chips for various applications, such as telecommunications, poses various challenges due to the complexity of these systems. These highly complex systems-on-chips demand new approaches to connect and manage the communication between on-chip processing and storage components and networks on chips (NoCs) provide a powerful solution.
This book is the first to provide a unified overview of NoC technology. It includes in-depth analysis of all the on-chip communication challenges, from physical wiring implementation up to software architecture, and a complete classification of their various Network-on-Chip approaches and solutions.
* Leading-edge research from world-renowned experts in academia and industry with state-of-the-art technology implementations/trends
* An integrated presentation not currently available in any other book
* A thorough introduction to current design methodologies and chips designed with NoCs

Securing the Information Infrastructure (Hardcover): Joseph Migga Kizza, Florence Migga Kizza Securing the Information Infrastructure (Hardcover)
Joseph Migga Kizza, Florence Migga Kizza
R2,630 Discovery Miles 26 300 Ships in 18 - 22 working days

Explores the full range of issues - moral, ethical, social, legal, and technological - involved in developing firm controls and best practices to secure the ever growing information infrastructure upon which societies and individuals depend.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 18 - 22 working days
Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative... Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative Solutions and Design (Hardcover, 1st ed. 2019)
George S. Moschytz
R3,252 Discovery Miles 32 520 Ships in 18 - 22 working days

This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.

OS X for Hackers at Heart (Paperback): Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers OS X for Hackers at Heart (Paperback)
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
R1,013 Discovery Miles 10 130 Ships in 10 - 15 working days

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world s foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive"

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,285 Discovery Miles 12 850 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

100 ADS Design Examples - Based on the Textbook: RF and Microwave Circuit Design (Hardcover): Ali A Behagi 100 ADS Design Examples - Based on the Textbook: RF and Microwave Circuit Design (Hardcover)
Ali A Behagi
R1,142 R970 Discovery Miles 9 700 Save R172 (15%) Ships in 18 - 22 working days
Cortical Function: a View from the Thalamus, Volume 149 (Hardcover): V. A. Casagrande, S. Murray Sherman, Ray W. Guillery Cortical Function: a View from the Thalamus, Volume 149 (Hardcover)
V. A. Casagrande, S. Murray Sherman, Ray W. Guillery
R6,202 Discovery Miles 62 020 Ships in 10 - 15 working days

Almost all of the messages that are received by the cerebral cortex from the environment or from the body's internal receptors come through the thalamus and much current thought about perceptual processing is based on sensory pathways that relay in the thalamus. This volume focuses on three major areas: the role of thalamocortical communication in cognition and attention; the role of the thalamus in communication between cortical areas; the hypothesis that much or all of the information relayed by thalamus, even to classical, pure "sensory" areas of cortex, represents a corollary message being sent simultaneously to motor centers. It presents a broad overview of important recent advances in these areas.
* Provides a look at brain structures involved in perception and action
* Includes summaries by leading investigators in the field
* Presents recent advances in our understanding of brain functions

Comprehensive Functional Verification - The Complete Industry Cycle (Hardcover, Anniv Sp and >): Bruce Wile, John Goss,... Comprehensive Functional Verification - The Complete Industry Cycle (Hardcover, Anniv Sp and >)
Bruce Wile, John Goss, Wolfgang Roesner
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

One of the biggest challenges in chip and system design is determining whether the hardware works correctly. That is the job of functional verification engineers and they are the audience for this comprehensive text from three top industry professionals.
As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for engineers, and none that cover the subject as comprehensively as this text.
A key strength of this book is that it describes the entire verification cycle and details each stage. The organization of the book follows the cycle, demonstrating how functional verification engages all aspects of the overall design effort and how individual cycle stages relate to the larger design process. Throughout the text, the authors leverage their 35 plus years experience in functional verification, providing examples and case studies, and focusing on the skills, methods, and tools needed to complete each verification task. Additionally, the major vendors (Mentor Graphics, Cadence Design Systems, Verisity, and Synopsys) have implemented key examples from the text and made these available on line, so that the reader can test out the methods described in the text.
* Comprehensive overview of the complete verification cycle
* Combines industry experience with a strong emphasis on functional verification fundamentals
* Includes real-world case studies and downloadable software implementations of key examples from the major vendors (Mentor Graphics, Cadence Design Systems, Verisity, and Synopsys)

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R1,870 R1,522 Discovery Miles 15 220 Save R348 (19%) Ships in 18 - 22 working days
XML in Data Management - Understanding and Applying Them Together (Paperback): Peter Aiken, M. David Allen XML in Data Management - Understanding and Applying Them Together (Paperback)
Peter Aiken, M. David Allen
R1,150 Discovery Miles 11 500 Ships in 10 - 15 working days

XML in Data Management is for IT managers and technical staff involved in the creation, administration, or maintenance of a data management infrastructure that includes XML. For most IT staff, XML is either just a buzzword that is ignored or a silver bullet to be used in every nook and cranny of their organization. The truth is in between the two. This book provides the guidance necessary for data managers to make measured decisions about XML within their organizations. Readers will understand the uses of XML, its component architecture, its strategic implications, and how these apply to data management.
To view a sample chapter and read the Foreword by Thomas C. Redman, visit http: //books.elsevier.com/mk/?isbn=0120455994
* Takes a data-centric view of XML.
* Explains how, when, and why to apply XML to data management systems.
* Covers XML component architecture, data engineering, frameworks, metadata, legacy systems, and more.
* Discusses the various strengths and weaknesses of XML technologies in the context of organizational data management and integration.

Enterprise Architecture and Integration - Methods, Implementation and Technologies (Hardcover, New): Enterprise Architecture and Integration - Methods, Implementation and Technologies (Hardcover, New)
R4,229 Discovery Miles 42 290 Ships in 18 - 22 working days

Enterprise integration is a broad activity that involves solving a range of issues relating to business process definition, common data standards, architectural compatibility, technical interoperability, and organizational alignment. Enterprise Architecture and Integration: Methods, Implementation, and Technologies provides a detailed analysis of the important strategies for integrating IT systems into fields such as e-business and customer-relationship management. This Premier Reference Source supplies readers with a comprehensive survey of existing enterprise architecture and integration approaches, and presents case studies that illustrate best practices. It takes a holistic view of enterprise integration, describing innovative methods, tools, and architectures with which organizations can systematically achieve enterprise integration.

Logic Functions and Equations - Fundamentals and Applications using the XBOOLE-Monitor (Hardcover, 3rd ed. 2022): Bernd... Logic Functions and Equations - Fundamentals and Applications using the XBOOLE-Monitor (Hardcover, 3rd ed. 2022)
Bernd Steinbach, Christian Posthoff
R2,885 Discovery Miles 28 850 Ships in 18 - 22 working days

The greatly expanded and updated 3rd edition of this textbook offers the reader a comprehensive introduction to the concepts of logic functions and equations and their applications across computer science and engineering. The authors' approach emphasizes a thorough understanding of the fundamental principles as well as numerical and computer-based solution methods. The book provides insight into applications across propositional logic, binary arithmetic, coding, cryptography, complexity, logic design, and artificial intelligence. Updated throughout, some major additions for the 3rd edition include: a new chapter about the concepts contributing to the power of XBOOLE; a new chapter that introduces into the application of the XBOOLE-Monitor XBM 2; many tasks that support the readers in amplifying the learned content at the end of the chapters; solutions of a large subset of these tasks to confirm learning success; challenging tasks that need the power of the XBOOLE software for their solution. The XBOOLE-monitor XBM 2 software is used to solve the exercises; in this way the time-consuming and error-prone manipulation on the bit level is moved to an ordinary PC, more realistic tasks can be solved, and the challenges of thinking about algorithms leads to a higher level of education.

VIC 20 Exposed (Hardcover, Collector's ed.): John Vander Reyden VIC 20 Exposed (Hardcover, Collector's ed.)
John Vander Reyden
R592 Discovery Miles 5 920 Ships in 18 - 22 working days
An Architecture for Fast and General Data Processing on Large Clusters (Hardcover): Matei Zaharia An Architecture for Fast and General Data Processing on Large Clusters (Hardcover)
Matei Zaharia
R1,838 Discovery Miles 18 380 Ships in 18 - 22 working days

The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.

Multimodality in Mobile Computing and Mobile Devices - Methods for Adaptable Usability (Hardcover, New): Stan Kurkovsky Multimodality in Mobile Computing and Mobile Devices - Methods for Adaptable Usability (Hardcover, New)
Stan Kurkovsky
R4,605 Discovery Miles 46 050 Ships in 18 - 22 working days

Originally designed for interpersonal communication, today mobile devices are capable of connecting their users to a wide variety of Internet-enabled services and applications. Multimodality in Mobile Computing and Mobile Devices: Methods for Adaptable Usability explores a variety of perspectives on multimodal user interface design, describes a variety of novel multimodal applications, and provides real-life experience reports. Containing research from leading international experts, this innovative publication presents core concepts that define multi-modal, multi-channel, and multi-device interactions and their role in mobile, pervasive, and ubiquitous computing.

Modeling and Simulation of Invasive Applications and Architectures (Hardcover, 1st ed. 2019): Sascha Roloff, Frank Hannig,... Modeling and Simulation of Invasive Applications and Architectures (Hardcover, 1st ed. 2019)
Sascha Roloff, Frank Hannig, Jurgen Teich
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book covers two main topics: First, novel fast and flexible simulation techniques for modern heterogeneous NoC-based multi-core architectures. These are implemented in the full-system simulator called InvadeSIM and designed to study the dynamic behavior of hundreds of parallel application programs running on such architectures while competing for resources. Second, a novel actor-oriented programming library called ActorX10, which allows to formally model parallel streaming applications by actor graphs and to analyze predictable execution behavior as part of so-called hybrid mapping approaches, which are used to guarantee real-time requirements of such applications at design time independent from dynamic workloads by a combination of static analysis and dynamic embedding.

Ed Mastery (Hardcover): Michael W Lucas Ed Mastery (Hardcover)
Michael W Lucas
R758 R697 Discovery Miles 6 970 Save R61 (8%) Ships in 18 - 22 working days
Experimental Multimedia Systems for Interactivity and Strategic Innovation (Hardcover): Ioannis Deliyannis, Petros Kostagiolas,... Experimental Multimedia Systems for Interactivity and Strategic Innovation (Hardcover)
Ioannis Deliyannis, Petros Kostagiolas, Christina Banou
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

Multimedia has evolved with the introduction of interaction, allowing and encouraging users to control and navigate through content. Experimental multimedia is a new human-computer communication method that allows for the reinvention and redevelopment of user content. Experimental Multimedia Systems for Interactivity and Strategic Innovation presents the next evolutionary step of multimedia where interactivity meets targeted creativity and experimentation. In providing the basic framework for experimental multimedia through case studies that allow the reader to appreciate the design of multimedia systems, this publication's audience extends beyond new media artists to scientists, publishers, and developers who wish to extend their system designs to offer adaptive capabilities combined with multimedia content and dynamic interaction. This publication presents a collection of carefully selected theoretical and applied research chapters with a focus on matters including, but not limited to, aesthetics in publishing, e-health systems, artificial intelligence, augmented reality, human-computer interaction, interactive multimedia, and new media curation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,199 Discovery Miles 11 990
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R895 R773 Discovery Miles 7 730
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic Hardcover R4,204 Discovery Miles 42 040
TI-83 Plus Calculator
BarCharts Inc Fold-out book or chart R229 Discovery Miles 2 290
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130

 

Partners