0
Your cart

Your cart is empty

Price
  • R50 - R100 (6)
  • R100 - R250 (240)
  • R250 - R500 (795)
  • R500+ (8,200)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Robot Operating System (ROS) - The Complete Reference (Volume 6) (Hardcover, 1st ed. 2021): Anis Koubaa Robot Operating System (ROS) - The Complete Reference (Volume 6) (Hardcover, 1st ed. 2021)
Anis Koubaa
R4,714 Discovery Miles 47 140 Ships in 18 - 22 working days

This book is the sixth volume of the successful book series on Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage of the Robot Operating Systems (ROS) and the latest trends and contributed systems. ROS is currently considered as the primary development framework for robotics applications. There are seven chapters organized into three parts. Part I presents two chapters on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become increasingly mature to be integrated into the industry. The first chapter from Amazon AWS deals with the challenges that ROS 2 developers will face as they transition their system to be commercial-grade. The second chapter deals with reactive programming for both ROS1 and ROS. In Part II, two chapters deal with advanced robotics, namely on the usage of robots in farms, and the second deals with platooning systems. Part III provides three chapters on ROS navigation. The first chapter deals with the use of deep learning for ROS navigation. The second chapter presents a detailed tuning guide on ROS navigation and the last chapter discusses SLAM for ROS applications. I believe that this book is a valuable companion for ROS users and developers to learn more ROS capabilities and features.

Principles of High-Performance Processor Design - For High Performance Computing, Deep Neural Networks and Data Science... Principles of High-Performance Processor Design - For High Performance Computing, Deep Neural Networks and Data Science (Hardcover, 1st ed. 2021)
Junichiro Makino
R4,628 Discovery Miles 46 280 Ships in 10 - 15 working days

This book describes how we can design and make efficient processors for high-performance computing, AI, and data science. Although there are many textbooks on the design of processors we do not have a widely accepted definition of the efficiency of a general-purpose computer architecture. Without a definition of the efficiency, it is difficult to make scientific approach to the processor design. In this book, a clear definition of efficiency is given and thus a scientific approach for processor design is made possible. In chapter 2, the history of the development of high-performance processor is overviewed, to discuss what quantity we can use to measure the efficiency of these processors. The proposed quantity is the ratio between the minimum possible energy consumption and the actual energy consumption for a given application using a given semiconductor technology. In chapter 3, whether or not this quantity can be used in practice is discussed, for many real-world applications. In chapter 4, general-purpose processors in the past and present are discussed from this viewpoint. In chapter 5, how we can actually design processors with near-optimal efficiencies is described, and in chapter 6 how we can program such processors. This book gives a new way to look at the field of the design of high-performance processors.

Project Management in Extreme Situations - Lessons from Polar Expeditions, Military and Rescue Operations, and Wilderness... Project Management in Extreme Situations - Lessons from Polar Expeditions, Military and Rescue Operations, and Wilderness Exploration (Paperback)
Monique Aubry, Pascal Lievre
R1,451 Discovery Miles 14 510 Ships in 9 - 17 working days

The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start. The current high level of change and complexity confronting organizational leaders and managers requires a new approach to projects so they can be managed flexibly to embrace and exploit change. What once used to be considered extreme uncertainty is now the norm, and managing planned projects is being replaced by managing projects as they evolve. Successfully managing projects in extreme situations, such as polar and military expeditions, shows how to manage successfully projects in today's turbulent environment. Executed under the harshest and most unpredictable conditions, these projects are great sources for learning about how to manage unexpected and unforeseen situations as they occur. This book presents multiple case studies of managing extreme events as they happened during polar, mountain climbing, military, and rescue expeditions. A boat accident in the Artic is a lesson on how an effective project manager must be ambidextrous: on one hand able to follow plans and on the other hand able to abandon those plans when disaster strikes and improvise new ones in response. Polar expeditions also illustrate how a team can use "weak links" to go beyond its usual information network to acquire strategic information. Fire and rescues operations illustrate how one team member's knowledge can be transferred to the entire team. Military operations provide case material on how teams coordinate and make use of both individual and collective competencies. This groundbreaking work pushes the definitions of a project and project management to reveal new insight that benefits researchers, academics, and the practitioners managing projects in today's challenging and uncertain times.

Hardware Architectures for Post-Quantum Digital Signature Schemes (Hardcover, 1st ed. 2021): Deepraj Soni, Kanad Basu, Mohammed... Hardware Architectures for Post-Quantum Digital Signature Schemes (Hardcover, 1st ed. 2021)
Deepraj Soni, Kanad Basu, Mohammed Nabeel, Najwa Aaraj, Marc Manzano, …
R2,880 Discovery Miles 28 800 Ships in 18 - 22 working days

This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.

System-on-Chip Security - Validation and Verification (Hardcover, 1st ed. 2020): Farimah Farahmandi, Yuanwen Huang, Prabhat... System-on-Chip Security - Validation and Verification (Hardcover, 1st ed. 2020)
Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra; Contributions by Fareena Saqib, Jim Plusquellic
R2,912 Discovery Miles 29 120 Ships in 18 - 22 working days

This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.

Trust Networks for Recommender Systems (Hardcover, Edition. ed.): Patricia Victor, Chris Cornelis, Martine de Cock Trust Networks for Recommender Systems (Hardcover, Edition. ed.)
Patricia Victor, Chris Cornelis, Martine de Cock
R1,415 Discovery Miles 14 150 Ships in 18 - 22 working days

This book describes research performed in the context of trust/distrust propagation and aggregation, and their use in recommender systems. This is a hot research topic with important implications for various application areas. The main innovative contributions of the work are: -new bilattice-based model for trust and distrust, allowing for ignorance and inconsistency -proposals for various propagation and aggregation operators, including the analysis of mathematical properties -Evaluation of these operators on real data, including a discussion on the data sets and their characteristics. -A novel approach for identifying controversial items in a recommender system -An analysis on the utility of including distrust in recommender systems -Various approaches for trust based recommendations (a.o. base on collaborative filtering), an in depth experimental analysis, and proposal for a hybrid approach -Analysis of various user types in recommender systems to optimize bootstrapping of cold start users.

Smart Trajectories - Metamodeling, Reactive Architecture for Analytics, and Smart Applications (Hardcover): Azedine Boulmakoul,... Smart Trajectories - Metamodeling, Reactive Architecture for Analytics, and Smart Applications (Hardcover)
Azedine Boulmakoul, Lamia Karim, Bharat Bhushan
R4,706 Discovery Miles 47 060 Ships in 9 - 17 working days

Highlights developments, discoveries, and practical and advanced experiences related to responsive distributed computing and how it can support the deployment of trajectory-based applications in intelligent systems. Presents metamodeling with new trajectories patterns which are very useful for intelligent transportation systems. Examines the processing aspects of raw trajectories to develop other types of semantic and activity-type and space-time path type trajectories. Discusses Complex Event Processing (CEP), Internet of Things (IoT), Internet of Vehicle (IoV), V2X communication, Big Data Analytics, distributed processing frameworks, and Cloud Computing. Presents a number of case studies to demonstrate smart trajectories related to spatio-temporal events such as traffic congestion, viral contamination, and pedestrian accidents.

Digital Project Practice for New Work and Industry 4.0 (Paperback): Tobias Endress Digital Project Practice for New Work and Industry 4.0 (Paperback)
Tobias Endress
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.

IoT Communication Performance Analysis (Hardcover, 1st ed. 2022): Chuzo Ninagawa IoT Communication Performance Analysis (Hardcover, 1st ed. 2022)
Chuzo Ninagawa
R3,987 Discovery Miles 39 870 Ships in 10 - 15 working days

This book deals with analysis techniques for TCP, UDP, Web, and SOAP data transmission performance on the IoT cloud side, CSMA-type, and multi-hop data transmission performance on the IoT edge side, as well as gateway receives buffer and transmit packet assembly data transmission performance. As mathematical tools for the analysis of communication performance, universal analysis methods such as stochastic processes, queues, Markov processes, and communication traffic simulators are applied to actual examples, and their usage is described in detail. This book aims to provide lifelong skills for analyzing communication performance that will serve as the basis for the future evolution of the IoT.

Android Programming For Beginners - The Simple Guide to Learning Android Programming Fast! (Hardcover): Tim Warren Android Programming For Beginners - The Simple Guide to Learning Android Programming Fast! (Hardcover)
Tim Warren
R549 R503 Discovery Miles 5 030 Save R46 (8%) Ships in 18 - 22 working days
Lifetime Reliability-aware Design of Integrated Circuits (Hardcover, 1st ed. 2023): Mohsen Raji, Behnam Ghavami Lifetime Reliability-aware Design of Integrated Circuits (Hardcover, 1st ed. 2023)
Mohsen Raji, Behnam Ghavami
R2,364 Discovery Miles 23 640 Ships in 10 - 15 working days

This book covers the state-of-the-art research in design of modern electronic systems used in safety-critical applications such as medical devices, aircraft flight control, and automotive systems. The authors discuss lifetime reliability of digital systems, as well as an overview of the latest research in the field of reliability-aware design of integrated circuits. They address modeling approaches and techniques for evaluation and improvement of lifetime reliability for nano-scale CMOS digital circuits, as well as design algorithms that are the cornerstone of Computer Aided Design (CAD) of reliable VLSI circuits. In addition to developing lifetime reliability analysis and techniques for clocked storage elements (such as flip-flops), the authors also describe analysis and improvement strategies targeting commercial digital circuits.

Intelligent Systems and Smart Infrastructure - Proceedings of ICISSI 2022 (Paperback): Brijesh Mishra, Subodh Wairya, Manish... Intelligent Systems and Smart Infrastructure - Proceedings of ICISSI 2022 (Paperback)
Brijesh Mishra, Subodh Wairya, Manish Tiwari, Rakesh Kumar Singh
R1,347 Discovery Miles 13 470 Ships in 10 - 15 working days

This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21-22, 2022. The conference was jointly organised by Shambhunath Institute of Engineering and Technology, Prayagraj UP India, Institute of Engineering and Technology (IET) Lucknow, U.P India, and Manipal University Jaipur, Rajasthan India with an aim to provide a platform for researchers, scientists, technocrats, academicians and engineers to exchange their innovative ideas and new challenges being faced in the field of emerging technologies. The papers presented in the conference have been compiled in form of chapters to focus on the core technological developments in the emerging fields like machine learning, intelligence systems, smart infrastructure, advanced power technology etc.

Developing Windows-Based and Web-Enabled Information Systems (Paperback): Nong Ye, Teresa Wu Developing Windows-Based and Web-Enabled Information Systems (Paperback)
Nong Ye, Teresa Wu
R2,004 Discovery Miles 20 040 Ships in 9 - 17 working days

Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity-relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components. The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don't have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.

A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd edition): Michael R Overly A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd edition)
Michael R Overly
R2,098 Discovery Miles 20 980 Ships in 9 - 17 working days

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R954 Discovery Miles 9 540 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

The Origins of Digital Computers - Selected Papers (Hardcover, 3rd ed. 1982): B. Randell The Origins of Digital Computers - Selected Papers (Hardcover, 3rd ed. 1982)
B. Randell
R5,467 Discovery Miles 54 670 Ships in 18 - 22 working days
AI-Powered IoT in the Energy Industry - Digital Technology and Sustainable Energy Systems (Hardcover, 1st ed. 2023): S.... AI-Powered IoT in the Energy Industry - Digital Technology and Sustainable Energy Systems (Hardcover, 1st ed. 2023)
S. Vijayalakshmi, Savita Dahiya, Balamurugan Balusamy, Rajesh Kumar Dhanaraj
R4,717 Discovery Miles 47 170 Ships in 18 - 22 working days

AI-Powered IoT in the Energy Industry: Digital Technology and Sustainable Energy Systems looks at opportunities to employ cutting-edge applications of artificial intelligence (AI), the Internet of Things (IoT), and Machine Learning (ML) in designing and modeling energy and renewable energy systems. The book's main objectives are to demonstrate how big data can help with energy efficiency and demand reduction, increase the usage of renewable energy sources, and assist in transitioning from a centralized system to a distributed, efficient, and embedded energy system. Contributions cover the fundamentals of the renewable energy sector, including solar, wind, biomass, and hydrogen, as well as building services and power generation systems. Chapters also examine renewable energy property prediction methods and discuss AI and IoT prediction models for biomass thermal properties. Covers renewable energy sector fundamentals; Explains the application of big data in distributed energy domains; Discusses AI and IoT prediction methods and models.

Computational Science and High Performance Computing III - The 3rd Russian-German Advanced Research Workshop, Novosibirsk,... Computational Science and High Performance Computing III - The 3rd Russian-German Advanced Research Workshop, Novosibirsk, Russia, 23 - 27 July 2007 (Hardcover, 2008 ed.)
Egon Krause, Yurii I Shokin, Nina Shokina
R5,289 Discovery Miles 52 890 Ships in 18 - 22 working days

This volume is published as the proceedings of the third Russian-German - vanced Research Workshop on Computational Science and High Performance Computing in Novosibirsk, Russia, in July 2007. The contributions of these proceedings were provided and edited by the - thors, chosen after a careful selection and reviewing. The workshop was organized by the High Performance Computing Center Stuttgart(Stuttgart,Germany)andtheInstituteofComputationalTechnologies SBRAS(Novosibirsk,Russia)intheframeworkofactivitiesoftheGerman-Russian CenterforComputationalTechnologiesandHighPerformanceComputing. Thee event is held biannually and has already become a good tradition for German and Russian scientists. The ?rst Workshop took place in September 2003 in Novosibirskand the second Workshopwas hosted by Stuttgart in March 2005. Both workshops gave the possibility of sharing and discussing the latest results and developing further scienti?c contacts in the ?eld of computational science and high performance computing. The topics of the current workshop include software and hardware for high performancecomputation,numericalmodellingingeophysicsandcomputational ?uid dynamics, mathematical modelling of tsunami waves, simulation of fuel cellsandmodern? breopticsdevices,numericalmodellingincryptographypr- lems andaeroacoustics,interval analysis,toolsfor Gridapplications,researchon service-oriented architecture (SOA) and telemedicine technologies. Theparticipationofrepresentativesofmajorresearchorganizationsengagedin the solution of the most complex problems of mathematical modelling, devel- ment of new algorithms,programsandkey elementsof informationtechnologies, elaboration and implementation of software and hardware for high performance computing systems,provideda highlevelof competenceofthe workshop. Among the German participants were the heads and leading specialists of the HighPerformanceComputingCenterStuttgart(HLRS)(UniversityofStuttgart), NECHighPerformanceComputingEuropeGmbH,SectionofAppliedMathem- ics(UniversityofFreiburgi.Br.),InstituteofAerodynamics(RWTHAachen),- gionalComputingCenterErlangen(RRZE(UniversityofErlangen-Nuremberg), Center for High Performance Computing (ZHR) (Dresden University of Technology).

Contributions to Ubiquitous Computing (Hardcover, 2007 ed.): Bernd Kramer Contributions to Ubiquitous Computing (Hardcover, 2007 ed.)
Bernd Kramer
R4,201 Discovery Miles 42 010 Ships in 18 - 22 working days

This book takes a holistic view on mobile and distributed computing systems. It presents innovative solutions at all system layers. These range from hardware over vertical and horizontal infrastructure services and novel middleware techniques to various types of application software. Some chapters address core properties of ubiquitous applications including mobility, self-healing and self-organization of both technical and social-technical systems.

Secrets of a Cyber Security Architect (Paperback): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Paperback)
Brook S. E. Schoenfield
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Acquiring Card Payments (Paperback): Ilya Dubinsky Acquiring Card Payments (Paperback)
Ilya Dubinsky
R1,471 Discovery Miles 14 710 Ships in 10 - 15 working days

This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology

Implementing Project and Program Benefit Management (Paperback): Kenn Dolan Implementing Project and Program Benefit Management (Paperback)
Kenn Dolan
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.

Creating Smart Enterprises - Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies (Paperback): Vivek Kale Creating Smart Enterprises - Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies (Paperback)
Vivek Kale
R1,490 Discovery Miles 14 900 Ships in 10 - 15 working days

"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.

Big Data and Analytics Applications in Government - Current Practices and Future Opportunities (Paperback): Gregory Richards Big Data and Analytics Applications in Government - Current Practices and Future Opportunities (Paperback)
Gregory Richards
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

Within this context, big data analytics (BDA) can be an important tool given that many analytic techniques within the big data world have been created specifically to deal with complexity and rapidly changing conditions. The important task for public sector organizations is to liberate analytics from narrow scientific silos and expand it across internally to reap maximum benefit across their portfolios of programs. This book highlights contextual factors important to better situating the use of BDA within government organizations and demonstrates the wide range of applications of different BDA techniques. It emphasizes the importance of leadership and organizational practices that can improve performance. It explains that BDA initiatives should not be bolted on but should be integrated into the organization's performance management processes. Equally important, the book includes chapters that demonstrate the diversity of factors that need to be managed to launch and sustain BDA initiatives in public sector organizations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad Hardcover R3,940 Discovery Miles 39 400
Language Technologies for the Challenges…
Georg Rehm, Thierry Declerck Hardcover R1,491 Discovery Miles 14 910
Functional Safety for Road Vehicles…
Hans-Leo Ross Hardcover R3,711 Discovery Miles 37 110
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,553 Discovery Miles 25 530
C++ Programming - Program Design…
D. Malik Paperback R1,646 R1,523 Discovery Miles 15 230
Multivariate Algorithms and…
Fred J. Hickernell, Peter Kritzer Hardcover R3,641 Discovery Miles 36 410
Fundamentals of Programming Languages
Chris Chancellor Hardcover R3,269 R2,959 Discovery Miles 29 590
Evolutionary Computation and Complex…
Jing Liu, Hussein A. Abbass, … Hardcover R2,653 Discovery Miles 26 530
Grouping Genetic Algorithms - Advances…
Michael Mutingi, Charles Mbohwa Hardcover R4,326 Discovery Miles 43 260
C Programming For Beginners - The Simple…
Tim Warren Hardcover R550 R505 Discovery Miles 5 050

 

Partners