0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (341)
  • R250 - R500 (1,203)
  • R500+ (9,238)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Advances in Mobile Computing and Communications - Perspectives and Emerging Trends in 5G Networks (Paperback): M. Bala Krishna,... Advances in Mobile Computing and Communications - Perspectives and Emerging Trends in 5G Networks (Paperback)
M. Bala Krishna, Jaime Lloret Mauri
R1,514 Discovery Miles 15 140 Ships in 12 - 17 working days

By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth generation (5G), which promises evolutionary if not revolutionary services. What those advanced services will look like, sound like, and feel like is the theme of the book Advances in Mobile Computing and Communications: Perspectives and Emerging Trends in 5G Networks. The book explores futuristic and compelling ideas in latest developments of communication and networking aspects of 5G. As such, it serves as an excellent guide for advanced developers, communication network scientists, researchers, academicians, and graduate students. The authors address computing models, communication architecture, and protocols based on 3G, LTE, LTE-A, 4G, and beyond. Topics include advances in 4G, radio propagation and channel modeling aspects of 4G networks, limited feedback for 4G, and game theory application for power control and subcarrier allocation in OFDMA cellular networks. Additionally, the book covers millimeter-wave technology for 5G networks, multicellular heterogeneous networks, and energy-efficient mobile wireless network operations for 4G and beyond using HetNets. Finally, the authors delve into opportunistic multiconnect networks with P2P WiFi and cellular providers and video streaming over wireless channels for 4G and beyond.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,394 Discovery Miles 13 940 Ships in 12 - 17 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

The Future X Network - A Bell Labs Perspective (Paperback): Marcus K. Weldon The Future X Network - A Bell Labs Perspective (Paperback)
Marcus K. Weldon
R1,477 Discovery Miles 14 770 Ships in 12 - 17 working days

We are at the dawn of an era in networking that has the potential to define a new phase of human existence. This era will be shaped by the digitization and connection of everything and everyone with the goal of automating much of life, effectively creating time by maximizing the efficiency of everything we do and augmenting our intelligence with knowledge that expedites and optimizes decision-making and everyday routines and processes. The Future X Network: A Bell Labs Perspective outlines how Bell Labs sees this future unfolding and the key technological breakthroughs needed at both the architectural and systems levels. Each chapter of the book is dedicated to a major area of change and the network and systems innovation required to realize the technological revolution that will be the essential product of this new digital future.

Practical Data Security - Applied Information Technology (Paperback): John Gordon Practical Data Security - Applied Information Technology (Paperback)
John Gordon
R1,044 Discovery Miles 10 440 Ships in 12 - 17 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

CoCo - The Colorful History of Tandy's Underdog Computer (Paperback): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Paperback)
Boisy G Pitre, Bill Loguidice
R1,437 Discovery Miles 14 370 Ships in 12 - 17 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover): Frank Siepmann Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover)
Frank Siepmann
R1,903 Discovery Miles 19 030 Ships in 12 - 17 working days

With cloud computing quickly becoming a standard in today s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments requiring a change in how we evaluate risk and protect information, processes, and people.
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization.
Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization.
Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics.
By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,456 Discovery Miles 14 560 Ships in 12 - 17 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

Designing Scientific Applications on GPUs (Hardcover): Raphael Couturier Designing Scientific Applications on GPUs (Hardcover)
Raphael Couturier
R5,680 Discovery Miles 56 800 Ships in 12 - 17 working days

Many of today's complex scientific applications now require a vast amount of computational power. General purpose graphics processing units (GPGPUs) enable researchers in a variety of fields to benefit from the computational power of all the cores available inside graphics cards. Understand the Benefits of Using GPUs for Many Scientific Applications Designing Scientific Applications on GPUs shows you how to use GPUs for applications in diverse scientific fields, from physics and mathematics to computer science. The book explains the methods necessary for designing or porting your scientific application on GPUs. It will improve your knowledge about image processing, numerical applications, methodology to design efficient applications, optimization methods, and much more. Everything You Need to Design/Port Your Scientific Application on GPUs The first part of the book introduces the GPUs and Nvidia's CUDA programming model, currently the most widespread environment for designing GPU applications. The second part focuses on significant image processing applications on GPUs. The third part presents general methodologies for software development on GPUs and the fourth part describes the use of GPUs for addressing several optimization problems. The fifth part covers many numerical applications, including obstacle problems, fluid simulation, and atomic physics models. The last part illustrates agent-based simulations, pseudorandom number generation, and the solution of large sparse linear systems for integer factorization. Some of the codes presented in the book are available online.

Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover): T. Ananth Kumar, T. S. Arun Samuel, R.... Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover)
T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy
R3,625 Discovery Miles 36 250 Ships in 9 - 15 working days

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback)
Brij B. Gupta
R1,448 Discovery Miles 14 480 Ships in 12 - 17 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Reconfigurable Computing Systems Engineering - Virtualization of Computing Architecture (Paperback): Lev Kirischian Reconfigurable Computing Systems Engineering - Virtualization of Computing Architecture (Paperback)
Lev Kirischian
R1,547 Discovery Miles 15 470 Ships in 12 - 17 working days

Reconfigurable Computing Systems Engineering: Virtualization of Computing Architecture describes the organization of reconfigurable computing system (RCS) architecture and discusses the pros and cons of different RCS architecture implementations. Providing a solid understanding of RCS technology and where it's most effective, this book: Details the architecture organization of RCS platforms for application-specific workloads Covers the process of the architectural synthesis of hardware components for system-on-chip (SoC) for the RCS Explores the virtualization of RCS architecture from the system and on-chip levels Presents methodologies for RCS architecture run-time integration according to mode of operation and rapid adaptation to changes of multi-parametric constraints Includes illustrative examples, case studies, homework problems, and references to important literature A solutions manual is available with qualifying course adoption. Reconfigurable Computing Systems Engineering: Virtualization of Computing Architecture offers a complete road map to the synthesis of RCS architecture, exposing hardware design engineers, system architects, and students specializing in designing FPGA-based embedded systems to novel concepts in RCS architecture organization and virtualization.

The Complete Project Management Office Handbook (Paperback, 3rd edition): Gerard M. Hill The Complete Project Management Office Handbook (Paperback, 3rd edition)
Gerard M. Hill
R1,456 Discovery Miles 14 560 Ships in 12 - 17 working days

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Illustrating the implications of project management in today's organizations, The Complete Project Management Office Handbook, Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization, this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs, purpose, and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists, detailed process steps, and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management, but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs, the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate "quick-wins" and early PMO-based accomplishments in their organization.

Information Security Management Handbook, Volume 7 (Hardcover, 6th edition): Richard O'Hanley, James S. Tiller Information Security Management Handbook, Volume 7 (Hardcover, 6th edition)
Richard O'Hanley, James S. Tiller
R4,324 Discovery Miles 43 240 Ships in 12 - 17 working days

Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Windows 10 Portable Genius (Paperback): P. McFedries Windows 10 Portable Genius (Paperback)
P. McFedries
R493 R316 Discovery Miles 3 160 Save R177 (36%) Ships in 9 - 15 working days

Your no-fluff, fast-paced guide to everything Windows 10 This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tricks, and savvy advice on how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an email account, and much, much more. Shows how to perform more than 150 Windows tasks, including working with files, digital images, and media; customizing Windows; optimizing performance; and sharing a computer with multiple users Covers installing and repairing applications, system maintenance, setting up password-protected accounts, downloading photos to your computer, and staying safe online With concise, easy-to-follow instructions, and its small, portable size, this is the ideal, on-the-go guide for Windows 10 users everywhere.

Interconnections for Computer Communications and Packet Networks (Paperback): Roberto Rojas-Cessa Interconnections for Computer Communications and Packet Networks (Paperback)
Roberto Rojas-Cessa
R1,967 Discovery Miles 19 670 Ships in 12 - 17 working days

This book introduces different interconnection networks applied to different systems. Interconnection networks are used to communicate processing units in a multi-processor system, routers in communication networks, and servers in data centers. Queuing techniques are applied to interconnection networks to support a higher utilization of resources. There are different queuing strategies, and these determine not only the performance of the interconnection network, but also the set of requirements to make them work effectively and their cost. Routing algorithms are used to find routes to destinations and directions in what information travels. Additional properties, such as avoiding deadlocks and congestion, are sought. Effective routing algorithms need to be paired up with these networks. The book will introduce the most relevant interconnection networks, queuing strategies, and routing algorithm. It discusses their properties and how these leverage the performance of the whole interconnection system. In addition, the book covers additional topics for memory management and congestion avoidance, used to extract higher performance from the interconnection network.

The Internet of Mechanical Things - The IoT Framework for Mechanical Engineers (Hardcover): Sami Salama Hussen Hajjaj, Kisheen... The Internet of Mechanical Things - The IoT Framework for Mechanical Engineers (Hardcover)
Sami Salama Hussen Hajjaj, Kisheen Rao Gsangaya
R2,603 Discovery Miles 26 030 Ships in 9 - 15 working days

This book provides knowledge, skills, and strategies an engineer requires to effectively integrate Internet of Things (IoT) into the field of mechanical engineering. Divided into three sections named IoT Strategies, IoT Foundation topics, and IoT system development, the volume covers introduction to IoT framework, its components, advantages, challenges, and practical process for effective implementation of IoT from mechanical engineering perspective. Further, it explains IoT systems and hands-on training modules, implementation, and execution of IoT Systems. Features: Presents exclusive material on application of IoT in mechanical engineering. Combines theory and practice including relevant terminologies and hands-on. Emphasis on use of IoT to streamline operations, reduce costs, and increased profits. Focusses on development and implementation of Raspberry Pi and Arduino based IoT systems. Illustrates use IoT data to improve performance of robots, machines, and systems. This book aims at Researchers, Graduate students in Mechanical Engineering, Computer Programming, Automobile, Robotics, and Industry 4.0/automation.

System Error - Where Big Tech Went Wrong and How We Can Reboot (Paperback): Jeremy Weinstein, Rob Reich, Mehran Sahami System Error - Where Big Tech Went Wrong and How We Can Reboot (Paperback)
Jeremy Weinstein, Rob Reich, Mehran Sahami
R305 R244 Discovery Miles 2 440 Save R61 (20%) Ships in 5 - 10 working days

Read this if you want to understand how to shape our technological future and reinvigorate democracy along the way. -- Reed Hastings, co-founder and CEO of Netflix __________ A forward-thinking manifesto from three Stanford professors which reveals how big tech's obsession with optimization and efficiency has sacrificed fundamental human values and outlines steps we can take to change course, renew our democracy, and save ourselves. __________ In no more than the blink of an eye, a naive optimism about technology's liberating potential has given way to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots. Yet too few of us see any alternative to accepting the onward march of technology. We have simply accepted a technological future designed for us by technologists, the venture capitalists who fund them, and the politicians who give them free rein. It doesn't need to be this way. System Error exposes the root of our current predicament: how big tech's relentless focus on optimization is driving a future that reinforces discrimination, erodes privacy, displaces workers, and pollutes the information we get. Armed with an understanding of how technologists think and exercise their power, three Stanford professors - a philosopher working at the intersection of tech and ethics, a political scientist who served under Obama, and the director of the undergraduate Computer Science program at Stanford (also an early Google engineer) - reveal how we can hold that power to account. As the dominance of big tech becomes an explosive societal conundrum, they share their provocative insights and concrete solutions to help everyone understand what is happening, what is at stake, and what we can do to control technology instead of letting it control us.

Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover): Ishaani Priyadarshini, Rohit Sharma Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover)
Ishaani Priyadarshini, Rohit Sharma
R4,641 Discovery Miles 46 410 Ships in 9 - 15 working days

Provides advanced system implementation for Smart Cities using Artificial Intelligence Addresses the complete functional framework workflow in Artificial Intelligence Explores basic and high-level concepts, thus servicing as a manual for those in the industry while also helping beginners Based on the latest technologies, and covering the major challenges, issues, and advances in Artificial Intelligence and Cybersecurity Discusses intelligent data management and automated systems through Artificial Intelligence and Cyber Security

Practical GameMaker Projects - Build Games with GameMaker Studio 2 (Paperback, 1st ed.): Ben Tyers Practical GameMaker Projects - Build Games with GameMaker Studio 2 (Paperback, 1st ed.)
Ben Tyers
R1,170 R908 Discovery Miles 9 080 Save R262 (22%) In Stock

Make ten simple, casual games, and learn a ton of GML coding along the way. Each of these games is the kind you can play when you have a minute or two free, and are great for playing on your PC, or exported to HTML5 or Android. Each game in Practical GameMaker Projects has its own chapter that explains the process of making each game, along with sketches, screenshots, coding, explanations, and tips. For each game there is a YYZ project file of the completed game that is ready to load and play. Also, all resources are available so you can make the game as you follow along in the book. To take full advantage of this book and the accompanying resources and project files, a Creator, Developer or Educational version of GameMaker Studio 2 is required. You can still gain a lot from this book if you have the free version of GameMaker Studio 2, but note that the free version doesn't allow the importation of YYZ project files used in the book, and has other limitations such as a limit on how many resources you can create. Each chapter has an introduction that explains what the aim of the game is, followed by a design and coding section which will cover the coding of the game. You're free to re-use code in your own projects, both free and paid. At the end of each chapter there is a things-to-try page that gives you five things to add to the game to improve its playability or appearance - pushing you a little to improve your planning and GML skills. What You'll Learn Build ten game applications using GameMaker Studio 2 Use the GameMaker Markup Language along the way Master the concepts behind each of the ten game apps Design and code for each of the ten game examples Try some add-ons for each of the ten games Who This Book Is For Game developers with at least some prior game development experience. GameMaker Studio experience recommended, but not required.

iPad fur Senioren fur Dummies (German, Paperback, 3. Auflage): Nancy C. Muir iPad fur Senioren fur Dummies (German, Paperback, 3. Auflage)
Nancy C. Muir
R688 R556 Discovery Miles 5 560 Save R132 (19%) Out of stock

Das iPad ist nicht nur handlich, sondern vor allem einfach zu bedienen. Wie genau, das zeigt Ihnen dieses Buch: Erfahren Sie, was Apps sind und wie Sie mit ihnen umgehen, wie Sie im Internet surfen, E-Books, Musik und Videos auf Ihr iPad laden und mit Familie und Freunden per E-Mail in Kontakt bleiben. Die vielen farbigen Abbildungen machen die Bedienung besonders anschaulich und helfen Ihnen, im Nu ein begeisterter iPad-Nutzer zu werden.

Parallel Programming for Modern High Performance Computing Systems (Paperback): Pawel Czarnul Parallel Programming for Modern High Performance Computing Systems (Paperback)
Pawel Czarnul
R1,441 Discovery Miles 14 410 Ships in 12 - 17 working days

In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems. This book covers the scope of parallel programming for modern high performance computing systems. It first discusses selected and popular state-of-the-art computing devices and systems available today, These include multicore CPUs, manycore (co)processors, such as Intel Xeon Phi, accelerators, such as GPUs, and clusters, as well as programming models supported on these platforms. It next introduces parallelization through important programming paradigms, such as master-slave, geometric Single Program Multiple Data (SPMD) and divide-and-conquer. The practical and useful elements of the most popular and important APIs for programming parallel HPC systems are discussed, including MPI, OpenMP, Pthreads, CUDA, OpenCL, and OpenACC. It also demonstrates, through selected code listings, how selected APIs can be used to implement important programming paradigms. Furthermore, it shows how the codes can be compiled and executed in a Linux environment. The book also presents hybrid codes that integrate selected APIs for potentially multi-level parallelization and utilization of heterogeneous resources, and it shows how to use modern elements of these APIs. Selected optimization techniques are also included, such as overlapping communication and computations implemented using various APIs. Features: Discusses the popular and currently available computing devices and cluster systems Includes typical paradigms used in parallel programs Explores popular APIs for programming parallel applications Provides code templates that can be used for implementation of paradigms Provides hybrid code examples allowing multi-level parallelization Covers the optimization of parallel programs

Introduction to Modeling and Simulation with MATLAB (R) and Python (Paperback): Steven I. Gordon, Brian Guilfoos Introduction to Modeling and Simulation with MATLAB (R) and Python (Paperback)
Steven I. Gordon, Brian Guilfoos
R1,437 Discovery Miles 14 370 Ships in 12 - 17 working days

Introduction to Modeling and Simulation with MATLAB and Python is intended for students and professionals in science, social science, and engineering that wish to learn the principles of computer modeling, as well as basic programming skills. The book content focuses on meeting a set of basic modeling and simulation competencies that were developed as part of several National Science Foundation grants. Even though computer science students are much more expert programmers, they are not often given the opportunity to see how those skills are being applied to solve complex science and engineering problems and may also not be aware of the libraries used by scientists to create those models. The book interleaves chapters on modeling concepts and related exercises with programming concepts and exercises. The authors start with an introduction to modeling and its importance to current practices in the sciences and engineering. They introduce each of the programming environments and the syntax used to represent variables and compute mathematical equations and functions. As students gain more programming expertise, the authors return to modeling concepts, providing starting code for a variety of exercises where students add additional code to solve the problem and provide an analysis of the outcomes. In this way, the book builds both modeling and programming expertise with a "just-in-time" approach so that by the end of the book, students can take on relatively simple modeling example on their own. Each chapter is supplemented with references to additional reading, tutorials, and exercises that guide students to additional help and allows them to practice both their programming and analytical modeling skills. In addition, each of the programming related chapters is divided into two parts - one for MATLAB and one for Python. In these chapters, the authors also refer to additional online tutorials that students can use if they are having difficulty with any of the topics. The book culminates with a set of final project exercise suggestions that incorporate both the modeling and programming skills provided in the rest of the volume. Those projects could be undertaken by individuals or small groups of students. The companion website at http://www.intromodeling.com provides updates to instructions when there are substantial changes in software versions, as well as electronic copies of exercises and the related code. The website also offers a space where people can suggest additional projects they are willing to share as well as comments on the existing projects and exercises throughout the book. Solutions and lecture notes will also be available for qualifying instructors.

Software Engineering for Science (Paperback): Jeffrey C. Carver, Neil P. Chue Hong, George K. Thiruvathukal Software Engineering for Science (Paperback)
Jeffrey C. Carver, Neil P. Chue Hong, George K. Thiruvathukal
R1,452 Discovery Miles 14 520 Ships in 12 - 17 working days

Software Engineering for Science provides an in-depth collection of peer-reviewed chapters that describe experiences with applying software engineering practices to the development of scientific software. It provides a better understanding of how software engineering is and should be practiced, and which software engineering practices are effective for scientific software. The book starts with a detailed overview of the Scientific Software Lifecycle, and a general overview of the scientific software development process. It highlights key issues commonly arising during scientific software development, as well as solutions to these problems. The second part of the book provides examples of the use of testing in scientific software development, including key issues and challenges. The chapters then describe solutions and case studies aimed at applying testing to scientific software development efforts. The final part of the book provides examples of applying software engineering techniques to scientific software, including not only computational modeling, but also software for data management and analysis. The authors describe their experiences and lessons learned from developing complex scientific software in different domains. About the Editors Jeffrey Carver is an Associate Professor in the Department of Computer Science at the University of Alabama. He is one of the primary organizers of the workshop series on Software Engineering for Science (http://www.SE4Science.org/workshops). Neil P. Chue Hong is Director of the Software Sustainability Institute at the University of Edinburgh. His research interests include barriers and incentives in research software ecosystems and the role of software as a research object. George K. Thiruvathukal is Professor of Computer Science at Loyola University Chicago and Visiting Faculty at Argonne National Laboratory. His current research is focused on software metrics in open source mathematical and scientific software.

Technologies Of Magic - A Cultural Study of Ghosts, Machines and the Uncanny (Paperback): Edward Scheer, John Potts Technologies Of Magic - A Cultural Study of Ghosts, Machines and the Uncanny (Paperback)
Edward Scheer, John Potts
R575 R471 Discovery Miles 4 710 Save R104 (18%) Ships in 12 - 17 working days

"Technologies of Magic" charts curious territory--a place occupied by both machines and magic. This collection of essays investigates the co-existence of very old forms of thought--belief in ghosts, magic, spirits--and contemporary culture. Refracted through highly technologised societies, magic manifests itself in surprising ways and through a diverse range of practices.

Apprehension of the magical --- in the world of machines --- can give rise to a feeling of uncanny unease. These essays show that ultimately this produces another way of thinking about technology in contemporary culture.

""Technologies of Magic" is both timely and historical: cogent in its contemporary observations and historically enchanting." -Esther Milne, "RealTime 77"

John Potts is associate professor in media and Edward Scheer is senior lecturer in the School of Media, Film, and Theatre at Macquarie Univeristy, Sydney. Other contributors include Chris Chesher, Anne Cranny-Francis, Annette Hamilton, Scott McQuire, Rachel Moore, Stephen Muecke, Andrew Murphie, and Patricia Pringle.

Parallel Computing for Data Science - With Examples in R, C++ and CUDA (Paperback): Norman Matloff Parallel Computing for Data Science - With Examples in R, C++ and CUDA (Paperback)
Norman Matloff
R1,487 Discovery Miles 14 870 Ships in 12 - 17 working days

Parallel Computing for Data Science: With Examples in R, C++ and CUDA is one of the first parallel computing books to concentrate exclusively on parallel data structures, algorithms, software tools, and applications in data science. It includes examples not only from the classic "n observations, p variables" matrix format but also from time series, network graph models, and numerous other structures common in data science. The examples illustrate the range of issues encountered in parallel programming. With the main focus on computation, the book shows how to compute on three types of platforms: multicore systems, clusters, and graphics processing units (GPUs). It also discusses software packages that span more than one type of hardware and can be used from more than one type of programming language. Readers will find that the foundation established in this book will generalize well to other languages, such as Python and Julia.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Natural Disasters
Stephen Marshak, Robert Rauber, … Paperback R4,120 Discovery Miles 41 200
Transcending Signs - Essays in…
Eero Tarasti Hardcover R4,750 R4,089 Discovery Miles 40 890
Pironi - The Champion that Never Was
David Sedgwick Paperback R412 R337 Discovery Miles 3 370
Een Voet Innie Kabr
Gaireyah Fredericks Paperback R280 R241 Discovery Miles 2 410
Lights Out, Full Throttle - The Good the…
Damon Hill, Johnny Herbert Hardcover R630 R516 Discovery Miles 5 160
Helene de Kock Keur 6
Helene Kock Paperback R320 R275 Discovery Miles 2 750
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R340 R292 Discovery Miles 2 920
Dandadan, Vol. 7
Yukinobu Tatsu Paperback R274 R222 Discovery Miles 2 220
Steinheist - Markus Jooste, Steinhoff…
Rob Rose Paperback  (1)
R385 R283 Discovery Miles 2 830
Understanding Divine Mercy
Fr Chris Alar Paperback R454 R376 Discovery Miles 3 760

 

Partners