0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (376)
  • R250 - R500 (1,221)
  • R500+ (9,225)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Management of Organizational Culture as a Stabilizer of Changes - Organizational Culture Management Dilemmas (Paperback):... Management of Organizational Culture as a Stabilizer of Changes - Organizational Culture Management Dilemmas (Paperback)
Ibrahiem M.M.El Emary, Anna Brzozowska, Dagmara Bubel
R1,401 Discovery Miles 14 010 Ships in 12 - 17 working days

Unique selling point:* Focuses on the relationship between organizational culture and change effectiveness with a focus on communication systemsCore audience:* Intended for IT and business management professionals Place in the market:* Will go alongside the main author's other books to give a full picture of IT systems being utilised within business management

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Internet of Things and Data Mining for Modern Engineering and Healthcare Applications (Hardcover): Ankan Bhattacharya,... Internet of Things and Data Mining for Modern Engineering and Healthcare Applications (Hardcover)
Ankan Bhattacharya, Bappadittya Roy, Samarendra Nath Sur, Saurav Mallik, Subhasis Dasgupta
R3,485 Discovery Miles 34 850 Ships in 12 - 17 working days

This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted

PC Annoyances 2e (Paperback, 2nd Revised edition): Steve Bass PC Annoyances 2e (Paperback, 2nd Revised edition)
Steve Bass
R526 Discovery Miles 5 260 Ships in 7 - 13 working days

In every PC user's life, there's a point when desperate measures must be taken. Some push their PC off a pier or chuck it into a landfill. Others turn their former computing ally into a planter box. But don't give up on your PC yet-help is at hand. This easy to read, accessible book from PC World expert Steve Bass covers the waterfront of PC gripes and gremlins, with fixes for everything from Windows glitches to browsers that won't browse. Each fix is served up in bite-sized portions for quick reading-and even quicker fixing. A revised version of its best-selling predecessor, the 2nd edition offers 50 additional pages and over 120 new fixed annoyances. This reader-friendly book tackles problems related to a wide-ranging number of topics: Windows-King of Annoyances! learn how to kick Windows in the rear, overcome glitches, take charge of the interface, live with the dreaded Service Pack 2 Hardware-wake up your DSL, tame your notebook, silence your PC's fan, work wonders with your scanner, and save paper Email-from Outlook to Eudora! Defeat spam, avoid mailing list hassles, send big files, manage folders Microsoft Office-learn workarounds for Word, Excel, and PowerPoint that help you back up the unbackable and automate data entry Internet-shake up IE, stop Flash, outsmart defaults, control Favorites, add the Google toolbar to Netscape Plus, you get access to more than one hundred utilities that will help you squash bugs, enhance your email, untangle a system snarl, and much more. If your PC has ever annoyed you (do we see several billion raised hands?), PC Annoyances is for you. With the flip of a page or two, you can fix that faux pas and have your PC purring again.

Design Technology and Digital Production - An Architecture Anthology (Hardcover): Gabriel Esquivel Design Technology and Digital Production - An Architecture Anthology (Hardcover)
Gabriel Esquivel
R3,909 Discovery Miles 39 090 Ships in 12 - 17 working days

• Showcases today's most influential architectural voices who have been instrumental in shifting the direction of design in the last decade • Includes perspectives of influential architects, practitioners and academics, as well as critics including philosophers • Case studies and essays engage and deploy a range of topics and technologies from speculative realism and Object Oriented Ontology to high computation, Big Data, parametricism, digital fabrication, artificial intelligence, augmented reality and virtual reality • A rigorous account of architecture's theoretical and technological concerns over the last decade

Internet of Things and the Law - Legal Strategies for Consumer-Centric Smart Technologies (Hardcover): Guido Noto La Diega Internet of Things and the Law - Legal Strategies for Consumer-Centric Smart Technologies (Hardcover)
Guido Noto La Diega
R3,805 Discovery Miles 38 050 Ships in 12 - 17 working days

Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power - and the increasing significance of their disembodied counterparts - has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital 'offline' technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the return of data, knowledge, and power within a physical 'smart' world. This development frames the book's central question: can the law steer rematerialisation in a human-centric and socially just direction? To answer it, the book focuses on the IoT, the sociotechnological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against 'smart' capitalism.

Workflow Scheduling on Computing Systems (Hardcover): Kenli Li, Xiaoyong Tang, Jing Mei, Longxin Zhang, Wangdong Yang, Keqin Li Workflow Scheduling on Computing Systems (Hardcover)
Kenli Li, Xiaoyong Tang, Jing Mei, Longxin Zhang, Wangdong Yang, …
R2,396 Discovery Miles 23 960 Ships in 12 - 17 working days

This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems' workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems' energy consumption, reliability, resource utilization, cost, and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets, this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design, management, and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure.

Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback)
Mai Helmy Shaheen
R1,268 Discovery Miles 12 680 Ships in 12 - 17 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Designing Switch/Routers - Fundamental Concepts and Design Methods (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts and Design Methods (Paperback)
James Aweya
R2,358 Discovery Miles 23 580 Ships in 12 - 17 working days

Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed

Designing Switch/Routers - Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Architectures and Applications (Paperback)
James Aweya
R2,349 Discovery Miles 23 490 Ships in 12 - 17 working days

Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks

Designing Switch/Routers - Fundamental Concepts and Design Methods (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts and Design Methods (Hardcover)
James Aweya
R5,806 Discovery Miles 58 060 Ships in 12 - 17 working days

Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed

Designing Switch/Routers - Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Architectures and Applications (Hardcover)
James Aweya
R5,806 Discovery Miles 58 060 Ships in 12 - 17 working days

Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks

Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover):... Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover)
Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhry
R3,192 Discovery Miles 31 920 Ships in 12 - 17 working days

This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,470 Discovery Miles 34 700 Ships in 12 - 17 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Energy Optimization Protocol Design for Sensor Networks in IoT Domains (Hardcover): Sanjeev J. Wagh, Manisha Sunil Bhende,... Energy Optimization Protocol Design for Sensor Networks in IoT Domains (Hardcover)
Sanjeev J. Wagh, Manisha Sunil Bhende, Anuradha D. Thakare
R3,174 Discovery Miles 31 740 Ships in 12 - 17 working days

This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.

Digital Innovation for Pandemics - Concepts, Challenges, Constraints, and Opportunities (Hardcover): Jasleen Kaur, Navjot Sidhu Digital Innovation for Pandemics - Concepts, Challenges, Constraints, and Opportunities (Hardcover)
Jasleen Kaur, Navjot Sidhu
R3,333 Discovery Miles 33 330 Ships in 12 - 17 working days

A pandemic does not only bring health concerns for society but also significantly affects individuals and government and business operations. Recently, COVID-19 has substantially hampered conventional businesses and organizations worldwide. Digital technology can help achieve business continuity and overcome challenges caused by pandemic situations. Digital innovation is the application of digital technology to existing business problems. Ideas such as digital transformation and digitization are closely related to digital innovation. In this pandemic period, many businesses recognize that they need to transform, innovate, and adopt new technologies to stay competitive. However, digital transformation is an inherently complex process, and the time pressure to adopt quickly may result in further complexities for organizations in fostering digital technologies. Digital Innovations for Pandemics: Concepts, Challenges, Constraints, and Opportunities presents the potential of digital responses to the COVID-19 pandemic. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis. Examining how information systems researchers can contribute to these global efforts, this book seeks to showcase how consumers, citizens, entrepreneurs, organizations, institutions, and governments are leveraging new and emerging digital innovations to disrupt and transform value creation in the pandemic era. It captures the breadth of digital innovations carried out to handle the pandemic and looks at the use of digital technologies to strengthen various processes. The book features the following: Solutions on how digital technologies enable responses to a global crisis An analysis of information systems used during the management of the COVID-19 pandemic New concepts for digital business and innovative content models for different sectors This book is written for advanced undergraduate students, postgraduate students, researchers, and scholars in the field of digital business, education, and healthcare. It includes theoretical chapters and case studies from leading scholars and practitioners on the technology-adoption practices of non-government organizations (NGOs), government, and business.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,358 Discovery Miles 43 580 Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,392 Discovery Miles 53 920 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Paperback): Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa... Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Paperback)
Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa Liao
R2,573 Discovery Miles 25 730 Ships in 12 - 17 working days

the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project

Strategic IT Governance 2.0 - How CIOs Succeed at Digital Innovation (Paperback): Philip Weinzimer Strategic IT Governance 2.0 - How CIOs Succeed at Digital Innovation (Paperback)
Philip Weinzimer
R1,370 Discovery Miles 13 700 Ships in 12 - 17 working days

Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies

Computers For Seniors For Dummies (Paperback, 5th Edition): Nancy C. Muir Computers For Seniors For Dummies (Paperback, 5th Edition)
Nancy C. Muir 2
R610 R490 Discovery Miles 4 900 Save R120 (20%) Ships in 7 - 13 working days

The bestselling guide--now in a new edition A computer provides a great resource for learning new things and keeping in touch with family and friends, but it may seem intimidating at first. The bestselling Computers For Seniors For Dummies is here to help the 50+ set conquer and overcome any uncertainty with clear-cut, easy-to-understand guidance on how to confidently navigate your computer and the Windows 10 operating system. Featuring large text and images, it's never been easier for seniors to smoothly click their way around a new PC. Even if you don't know a mouse from a megabyte, this book walks you through all the steps to choosing, setting up, and successfully using your new computer. Begin with learning how to turn the computer on and use the keyboard, and from there you'll progress to effortlessly finding your way around the new Windows 10 operating system. Explore all you can do with a computer: Research topics of interest Keep in touch with loved ones Shop securely online Find recipes and diet tips If you've just purchased your first computer and need a plain-English introduction to getting started, Computers For Seniors For Dummies has you covered.

Monolith to Microservices - Evolutionary Patterns to Transform Your Monolith (Paperback): Sam Newman Monolith to Microservices - Evolutionary Patterns to Transform Your Monolith (Paperback)
Sam Newman
R1,077 R945 Discovery Miles 9 450 Save R132 (12%) Ships in 12 - 17 working days

How do you detangle a monolithic system and migrate it to a microservice architecture? How do you do it while maintaining business-as-usual? As a companion to Sam Newman's extremely popular Building Microservices, this new book details a proven method for transitioning an existing monolithic system to a microservice architecture. With many illustrative examples, insightful migration patterns, and a bevy of practical advice to transition your monolith enterprise into a microservice operation, this practical guide covers multiple scenarios and strategies for a successful migration, from initial planning all the way through application and database decomposition. You'll learn several tried and tested patterns and techniques that you can use as you migrate your existing architecture. Ideal for organizations looking to transition to microservices, rather than rebuild Helps companies determine whether to migrate, when to migrate, and where to begin Addresses communication, integration, and the migration of legacy systems Discusses multiple migration patterns and where they apply Provides database migration examples, along with synchronization strategies Explores application decomposition, including several architectural refactoring patterns Delves into details of database decomposition, including the impact of breaking referential and transactional integrity, new failure modes, and more

Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Hardcover): Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa... Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Hardcover)
Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa Liao
R6,163 Discovery Miles 61 630 Ships in 12 - 17 working days

the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R3,052 Discovery Miles 30 520 Ships in 12 - 17 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

Introduction to Engineering and Scientific Computing with Python (Hardcover): David E. Clough, Steven C. Chapra Introduction to Engineering and Scientific Computing with Python (Hardcover)
David E. Clough, Steven C. Chapra
R2,830 Discovery Miles 28 300 Ships in 12 - 17 working days

1) Provides a levelling approach, bringing students at all stages of programming experience to the same point 2) Focuses Python, a general language, to an engineering and scientific context 3) Uses a classroom tested, practical approach to teaching programming 4) Teaches students and professionals how to use Python to solve engineering calculations such as differential and algebraic equations

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
My Windows 11 Computer for Seniors
Michael Miller Paperback R577 Discovery Miles 5 770
iMac For Dummies, 11th Edition
ML Chambers Paperback R709 R506 Discovery Miles 5 060
Chip War - The Fight for the World's…
Chris Miller Hardcover R870 R671 Discovery Miles 6 710
Laptops For Dummies, 7th Edition
D. Gookin Paperback R799 R571 Discovery Miles 5 710
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,394 Discovery Miles 13 940
Windows 11 For Seniors For Dummies
C. Simmons Paperback R708 R506 Discovery Miles 5 060
Windows 11 For Dummies
A Rathbone Paperback R671 R489 Discovery Miles 4 890
iOS 14 Programming Fundamentals with…
Matt Neuberg Paperback R1,467 Discovery Miles 14 670
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,771 Discovery Miles 17 710
The Architecture of Computer Hardware…
I Englander Paperback R4,164 R662 Discovery Miles 6 620

 

Partners