![]() |
![]() |
Your cart is empty |
||
An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.
With the leverage of digital reproducibility, historical messages of hate are finding new recipients with breathtaking speed and scope. The rapid growth in popularity of right-wing extremist groups in response to transnational economic crises underscores the importance of examining in detail the language and political mobilization strategies of the New Right. In Europe, for example, populist right-wing activists organized around an anti-immigration agenda are becoming more vocal, providing pushback against the increase in migration flows from North Africa and Eastern Europe and countering support for integration with a categorical rejection of multiculturalism. In the United States, anti-immigration sentiment provides a rallying point for political and personal agendas that connect the rhetoric of borders with national, racial, and security issues. Digital Media Strategies of the Far Right in Europe and the United States is an effort to examine and understand these issues, informed by the conviction that an interdisciplinary and transnational approach can allow productive comparison of far-right propaganda strategies in Europe and the United States. With a special emphasis on performing ideology in the far-right music scene, on violent anti-immigrant stances, and on the far right's skillful creation and manipulation of virtual communities, the contributions foreground the cultural shibboleths that are exchanged among far-right supporters on the Internet, which serve to generate a sense of group belonging and the illusion of power far greater that the known numbers of neo-Nazis in any one country might suggest. Moreover, with attention to transatlantic right-wing movements and their use of particularly digital media, the essays in this volume put pressure on the similarities among the various national agents, while accommodating differences in the virtual and sometimes violent identities created and nurtured online.
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
The digital transformation of healthcare delivery is in full swing. Health monitoring is increasingly becoming more effective, efficient, and timely through mobile devices that are now widely available. This, as well as wireless technology, is essential to assessing, diagnosing, and treating medical ailments. However, systems and applications that boost wellness must be properly designed and regulated in order to protect the patient and provide the best care. Optimizing Health Monitoring Systems With Wireless Technology is an essential publication that focuses on critical issues related to the design, development, and deployment of wireless technology solutions for healthcare and wellness. Highlighting a broad range of topics including solution evaluation, privacy and security, and policy and regulation, this book is ideally designed for clinicians, hospital directors, hospital managers, consultants, health IT developers, healthcare providers, engineers, software developers, policymakers, researchers, academicians, and students.
Ex. Consultant (Statistics), College of Fisheries, Central Agricultural University, Lembucherra Tripura West, Ex. Computer Specialist, SAARC Agricultural Information Centre, Dhaka, Bangladesh, Ex Pr. Head, Social Science, CIFA, ICAR, Bhubaneswar, Ex Co-ordinator, Bioinformatics Centre, CIFA, ICAR, Bhubaneswar, All the 42 book s constitute the following focus areas like Biotechnology, Bioinformatics, Nanotechnology, Expert System Neural Network, Applied Technologies, Database, Modeling, Analytics and Business Intelligence Software, IPR & Social Issues. s on Emerging digital technologies, Information and communication Technology Tools, skill and technologies for 21st century Education, Big data, Business intelligence softwares, GIS, IPR and Knowledge/Patenting/Indigenous and Traditional Knowledge Management (KM) challenges are also included in the book. The book is divided into 5 broad sections covering the whole gamut of emerging technologies in the fields: 01. Biotechnology, 02. Nanotechnology, 03. Expert System Neural Network, 04. Applied Technologies, 05. Database, Modeling, Analytics and Business Intelligence Software, It is expected that the book will be very much useful because with the emergence of new technologies and application through software tools are becoming very important in the 21st Century society.
This fifth edition continues to improve on the features that have made it the market leader. The text offers a flexible organization, enabling instructors to adapt the book to their particular courses. The book is both complete and careful, and it continues to maintain its emphasis on algorithms and applications. Excellent exercise sets allow students to perfect skills as they practice. This new edition continues to feature numerous computer science applications-making this the ideal text for preparing students for advanced study.
For courses in Logic and Computer design. Understanding Logic and Computer Design for All Audiences Logic and Computer Design Fundamentals is a thoroughly up-to-date text that makes logic design, digital system design, and computer design available to students of all levels. The Fifth Edition brings this widely recognised source to modern standards by ensuring that all information is relevant and contemporary. The material focuses on industry trends and successfully bridges the gap between the much higher levels of abstraction students in the field must work with today than in the past. Broadly covering logic and computer design, Logic and Computer Design Fundamentals is a flexibly organised source material that allows instructors to tailor its use to a wide range of student audiences.
A fully updated version of Pearson's bestselling Brilliant Windows titles, covering Windows 10 - the latest release of the widely-used Microsoft operating system. Brilliant Windows 10 gives you the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, full-colour, step-by-step approach and tells you exactly what you need to know, when you need to know it. For the first time, this book comes with FREE downloadable bonus material. An extra 140 pages, which cover chapters on advanced subjects like customising Windows, maintaining your computer and managing your hardware as well as the key, new features of Office 2016. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level tasks. Brilliant guides provide the quick, easy-to-access information that you need: Numbered steps guide you through each task or problem Numerous colour screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice
Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications covers timely topics, including the neural network (NN), particle swarm optimization (PSO), evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS), etc. Furthermore, the book highlights recent research on representative techniques to elaborate how a data-centric system formed a powerful platform for the processing of cloud hosted multimedia big data and how it could be analyzed, processed and characterized by CI. The book also provides a view on how techniques in CI can offer solutions in modeling, relationship pattern recognition, clustering and other problems in bioengineering. It is written for domain experts and developers who want to understand and explore the application of computational intelligence aspects (opportunities and challenges) for design and development of a data-centric system in the context of multimedia cloud, big data era and its related applications, such as smarter healthcare, homeland security, traffic control trading analysis and telecom, etc. Researchers and PhD students exploring the significance of data centric systems in the next paradigm of computing will find this book extremely useful.
Biotechnological tools supplement various conventional approaches in conservation, characterization and utilization for increasing production and productivity of agricultural and horticultural crops. The emerging field of bioinformatics is an integrated field arising from merging of biology and informatics. It is a conglomeration of various new frontiers of science like genomics, proteomics, metabolomics etc. The rich warehouse of proteome and genome information nearly doubling every year has significant implications and applications in various areas of science including agriculture, horticulture, forestry and food science. Cheminformatics is specialized to a range of problems in the field of chemistry. Chemical pesticide reduction is possible by adopting cheminformatics methods to identify naturally occurring chemical compounds in crops which act against pests. Bioinformatics has transformed the discipline of life science from a purely lab based science to an information science as well. The ICAR has recently launched a National Agricultural Bioinformatics Grid (NABG) to serve as a computational facility in developing national biodatabases and data warehouses. The present book Agriculture Bioinformatics is a compilation of 17 information packed s authored by working scientists in the respective discipline. In addition to the theoretical information, practical and applied aspects to boost productivity and quality of crops are given.
Autism spectrum disorder (ASD) is known as a neuro-disorder in which a person may face problems in interaction and communication with people, amongst other challenges. As per medical experts, ASD can be diagnosed at any stage or age but is often noticeable within the first two years of life. If caught early enough, therapies and services can be provided at this early stage instead of waiting until it is too late. ASD occurrences appear to have increased over the last couple of years leading to the need for more research in the field. It is crucial to provide researchers and clinicians with the most up-to-date information on the clinical features, etiopathogenesis, and therapeutic strategies for patients as well as to shed light on the other psychiatric conditions often associated with ASD. In addition, it is equally important to understand how to detect ASD in individuals for accurate diagnosing and early detection. Artificial Intelligence for Accurate Analysis and Detection of Autism Spectrum Disorder discusses the early detection and diagnosis of autism spectrum disorder enabled by artificial intelligence technologies, applications, and therapies. This book will focus on the early diagnosis of ASD through artificial intelligence, such as deep learning and machine learning algorithms, for confirming diagnosis or suggesting the need for further evaluation of individuals. The chapters will also discuss the use of artificial intelligence technologies, such as medical robots, for enhancing the communication skills and the social and emotional skills of children who have been diagnosed with ASD. This book is ideally intended for IT specialists, data scientists, academicians, scholars, researchers, policymakers, medical practitioners, and students interested in how artificial intelligence is impacting the diagnosis and treatment of autism spectrum disorder.
A significant revision of a best-selling text for the introductory digital signal processing course. This book presents the fundamentals of discrete-time signals, systems, and modern digital processing and applications for students in electrical engineering, computer engineering, and computer science.The book is suitable for either a one-semester or a two-semester undergraduate level course in discrete systems and digital signal processing. It is also intended for use in a one-semester first-year graduate-level course in digital signal processing.
As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.
It is now more important than ever to implement approaches and methods that can be effective in extracting meaningful information from large data sets. Although data sets may be available for different aspects of society, we may not assess the intrinsic characteristics of their behavior effectively. Additionally, frameworks are needed that can store, process, and represent the data in such a manner that can be of practical significance. Interdisciplinary Approaches to Information Systems and Software Engineering is an essential reference publication that assesses the significance of robust information systems in characterizing events of varying nature and dimensions. Additionally, the book includes studies on the development and application of decision-making and prediction modeling frameworks using different approaches such as agent-based modeling, spatial decision support systems, and spatial data mining. Covering topics such as management information systems, knowledge discovery, and mathematical analysis, this book is ideal for professionals, researchers, and academicians in various disciplines including computer science, information technology, geographical information systems, remote sensing, and earth system sciences.
Chatbots offer exceptional services to end-users due to various factors including the ability to respond to customers' requests quickly according to their convenience. Given the magnitude of research and interest in chatbots, further study on several vital and evolving concerns including human-bot interaction, chatbot adoption, chatbot architecture and design considerations, and chatbot evaluation is required to ensure the technology is utilized appropriately. Trends, Applications, and Challenges of Chatbot Technology provides novel research content and reviews of current chatbot technology and sheds light on challenges and open questions as well as possible research directions. Covering key topics such as human-computer interaction, customer support, and algorithms, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, practitioners, scholars, instructors, and students.
Fractional Order Systems: Optimization, Control, Circuit Realizations and Applications consists of 21 contributed chapters by subject experts. Chapters offer practical solutions and novel methods for recent research problems in the multidisciplinary applications of fractional order systems, such as FPGA, circuits, memristors, control algorithms, photovoltaic systems, robot manipulators, oscillators, etc. This book is ideal for researchers working in the modeling and applications of both continuous-time and discrete-time dynamics and chaotic systems. Researchers from academia and industry who are working in research areas such as control engineering, electrical engineering, mechanical engineering, computer science, and information technology will find the book most informative.
Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the integration of discrete event and continuous modeling approaches, the work focuses light on DEVS and its potential to support the co-existence and interoperation of multiple formalisms in model components. New sections in this updated edition include discussions on important new extensions to theory, including chapter-length coverage of iterative system specification and DEVS and their fundamental importance, closure under coupling for iteratively specified systems, existence, uniqueness, non-deterministic conditions, and temporal progressiveness (legitimacy).
|
![]() ![]() You may like...
Next Generation Nanochitosan…
Charles Oluwaseun Adetunji, Daniel Ingo Hefft, …
Paperback
R4,171
Discovery Miles 41 710
New and Future Developments in Microbial…
H. B Singh, Vijai G. Gupta, …
Hardcover
Value-Addition in Agri-Food Industry…
Mohammed Kuddus, Pramod Ramteke
Paperback
R4,185
Discovery Miles 41 850
Novel Platforms for Drug Delivery…
Sangita Das, Sabu Thomas, …
Paperback
R6,437
Discovery Miles 64 370
|