0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (621)
  • R250 - R500 (2,183)
  • R500+ (29,945)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Python Programming Professional Made Easy (Hardcover): Sam Key Python Programming Professional Made Easy (Hardcover)
Sam Key
R783 Discovery Miles 7 830 Ships in 18 - 22 working days

Python Programming Professional Made Easy 2nd Edition! Sam Key back at it again with his upgraded version of Python Going from beginner to professional? Want to skip the learning curve? Need the jargon removed so you can understand in your terms? From various programming languages to statements and Basic Operators Everything you need to know with functions and flow controls! Don't waste anytime and jump on board of Python! Start your programming right now!

Data Privacy Games (Hardcover, 1st ed. 2018): Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren Data Privacy Games (Hardcover, 1st ed. 2018)
Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

The VHDL Reference - A Practical Guide to Computer  -Aided Integrated Circuit Design Including VHDL-  AMS (Hardcover): U Heinkel The VHDL Reference - A Practical Guide to Computer -Aided Integrated Circuit Design Including VHDL- AMS (Hardcover)
U Heinkel
R4,758 Discovery Miles 47 580 Ships in 18 - 22 working days

The VHDL Reference: The essential guide for students and professionals working in computer hardware design and synthesis. The definitive guide to VHDL, this book combines a comprehensive reference of the VHDL syntax with tutorial and workshop materials that guide the reader through the principles of digital hardware design. The authors describe the concept of VHDL and VHDL-AMS for modelling and synthesis and explain how VHDL can be used for the design of digital systems. The CD-ROM features workshop and reference material to familiarise beginners with the use of VHDL for simulation and for synthesis. In-depth examples of VHDL construct are explained in compact and easy to follow form providing immediate help and answers to specific problems. The VHDL Reference is a highly accessible single source reference to the industry standard language for computer-aided electronic system design. It is not only an essential guide for undergraduate and postgraduate students in electrical engineering but also an indispensable aid to researchers and hardware designers and teachers using VHDL and logic synthesis. Features include:

  • Accompanying CD-ROM version of the VHDL Reference including demonstration tools and workshop material covering language aspects for digital systems.
  • Modelling tutorial featuring VHDL-AMS, the new standard for modelling and simulating mixed signal micro systems. Real-life examples enable the reader to test their knowledge and clarify their understanding of the concepts.
  • Design workshop format taking the reader through an entire circuit design using an actual design problem, allowing beginners to put their VHDL skills into practice.
  • A user friendly reference section providing in-depth coverage of the VHDL language for digital systems.
  • Includes tools, on CD-ROM, for editing VHDL source files, simulating and synthesising VHDL models.
ICT World - Development, Failure of Computer & Smartphone Technologies (Paperback): MD Fazle Mubin, MD Izhar Tahmid, MD Fathe... ICT World - Development, Failure of Computer & Smartphone Technologies (Paperback)
MD Fazle Mubin, MD Izhar Tahmid, MD Fathe Mubin
R294 Discovery Miles 2 940 Ships in 18 - 22 working days
Design of Arithmetic Circuits in Quantum Dot Cellular Automata Nanotechnology (Hardcover, 2015 ed.): K. Sridharan, Vikramkumar... Design of Arithmetic Circuits in Quantum Dot Cellular Automata Nanotechnology (Hardcover, 2015 ed.)
K. Sridharan, Vikramkumar Pudi
R3,161 Discovery Miles 31 610 Ships in 18 - 22 working days

This research monograph focuses on the design of arithmetic circuits in Quantum Dot Cellular Automata (QCA). Using the fact that the 3-input majority gate is a primitive in QCA, the book sets out to discover hitherto unknown properties of majority logic in the context of arithmetic circuit designs. The pursuit for efficient adders in QCA takes two forms. One involves application of the new results in majority logic to existing adders. The second involves development of a custom adder for QCA technology. A QCA adder named as hybrid adder is proposed and it is shown that it outperforms existing multi-bit adders with respect to area and delay. The work is extended to the design of a low-complexity multiplier for signed numbers in QCA. Furthermore the book explores two aspects unique to QCA technology, namely thermal robustness and the role of interconnects. In addition, the book introduces the reader to QCA layout design and simulation using QCADesigner. Features & Benefits: This research-based book: *Introduces the reader to Quantum Dot Cellular Automata, an emerging nanotechnology. *Explores properties of majority logic. *Demonstrates application of the properties to design efficient arithmetic circuits. *Guides the reader towards layout design and simulation in QCADesigner.

I.T. Risk Management - 2011 Edition (Paperback): Andreas Sofroniou I.T. Risk Management - 2011 Edition (Paperback)
Andreas Sofroniou
R510 Discovery Miles 5 100 Ships in 10 - 15 working days

A risk is an uncertain event which may have an adverse effect on the project's objectives. This Risk Management book is based on a proven risk management methodology, which should be very effective in the quest for identifying risks throughout the project life-cycle. The I.T. Risk Management process commences by identifying the enterprises most important and risky projects, as these must be given priority. This I.T. Risk Management book/manual is essentially a method that permits the collection of knowledge and experience from those involved, in a form that facilitates the Systematic Interaction and Generic Methodology for Applications.

Cambridge Technicals Level 3 IT (Paperback): Victoria Ellis, Graham Manson, Saundra Middleton Cambridge Technicals Level 3 IT (Paperback)
Victoria Ellis, Graham Manson, Saundra Middleton; Edited by Maureen Everett
R1,174 Discovery Miles 11 740 Ships in 10 - 15 working days

Exam Board: Cambridge Level: Key Stage 4 Subject: IT First Teaching: September 2016 First Exam: June 207 Support your teaching of the new Cambridge Technicals 2016 suite with Cambridge Technical Level 3 IT, developed in partnership between OCR and Hodder Education; this textbook covers each specialist pathway and ensures your ability to deliver a flexible course that is both vocationally focused and academically thorough. Cambridge Technical Level 3 IT is matched exactly to the new specification and follows specialist pathways in IT Infrastructure Technician, Emerging Digital Technology Practitioner, Application Developer, and Data Analyst. - Ensures effective teaching of each specialist pathway offered within the qualification. - Focuses learning on the skills, knowledge and understanding demanded from employers and universities. - Provides ideas and exercises for the application of practical skills and knowledge. - Developed in partnership between Hodder Education and OCR, guaranteeing quality resources which match the specification perfectly Hodder Education have worked with OCR to make updates to our Cambridge Technicals textbooks to bring them more closely in line with the model assignment course requirements. We would like to let you know about a recent change to this textbook, updated pages which are now available free of charge as a PDF when you click on the 'Amended Pages' link on the left of this webpage.

Information and Communication Technologies in Support of the Tourism Industry (Hardcover): Wayne Pease, Michelle Rowe, Malcolm... Information and Communication Technologies in Support of the Tourism Industry (Hardcover)
Wayne Pease, Michelle Rowe, Malcolm Cooper
R2,632 Discovery Miles 26 320 Ships in 18 - 22 working days

Tourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. ""Information and Communication Technologies in Support of the Tourism Industry"" examines the process of transformation as it relates to the tourism industry, and the changes to that industry from modern electronic communications. ""Information and Communication Technologies in Support of the Tourism Industry"" covers not only geographically supportive technologies in communication, but also in terms of culture, economics, marketing, social, and regional issues. In-depth analyses range from the use of the Internet to supply information to the emerging patterns of tourist decision making and investments.

Python for Beginners - Learn It as Easy as Pie (Hardcover): Yatin Bayya Python for Beginners - Learn It as Easy as Pie (Hardcover)
Yatin Bayya
R524 Discovery Miles 5 240 Ships in 10 - 15 working days
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover): Bryan Jeffrey Parno Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover)
Bryan Jeffrey Parno
R1,996 Discovery Miles 19 960 Ships in 18 - 22 working days

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Python Programming - The Easiest Python Crash Course to go Deep Through the Main Application as Web Development, Data Analysis... Python Programming - The Easiest Python Crash Course to go Deep Through the Main Application as Web Development, Data Analysis and Data Science Including Machine Learning (Hardcover)
Alan Grid
R707 Discovery Miles 7 070 Ships in 10 - 15 working days
My Hardcover Book (Hardcover): Lasse Smith My Hardcover Book (Hardcover)
Lasse Smith
R846 Discovery Miles 8 460 Ships in 18 - 22 working days

Learn SEO - Search Engine Optimization and how to get traffic from Google and the other big search engines. Achieve high rankings - Get long term value and rank the right way!

The Multibody Systems Approach to Vehicle Dynamics (Paperback, 2nd edition): Michael Blundell, Damian Harty The Multibody Systems Approach to Vehicle Dynamics (Paperback, 2nd edition)
Michael Blundell, Damian Harty
R1,910 Discovery Miles 19 100 Ships in 10 - 15 working days

Filling the gaps between subjective vehicle assessment, classical vehicle dynamics and computer-based multibody approaches, "The Multibody Systems Approach to Vehicle Dynamics" offers unique coverage of both the virtual and practical aspects of vehicle dynamics from concept design to system analysis and handling development.

The book provides valuable foundation knowledge of vehicle dynamics as well as drawing on laboratory studies, test-track work, and finished vehicle applications to gel theory with practical examples and observations. Combined with insights into the capabilities and limitations of multibody simulation, this comprehensive mix provides the background understanding, practical reality and simulation know-how needed to make and interpret useful models.

New to this edition you will find coverage of the latest tire models, changes to the modeling of light commercial vehicles, developments in active safety systems, torque vectoring, and examples in AView, as well as updates to theory, simulation, and modeling techniques throughout.
Unique gelling of foundational theory, research findings, practical insights, and multibody systems modeling know-how, reflecting the mixed academic and industrial experience of this expert author teamDownloadable models, code, and data sets, available from the book s companion website, enable readers to explore the material in the book interactivelyCoverage of the latest models, safety developments, simulation methods, and features bring the new edition up to date with advances in this critical and evolving field"

Machine Learning for Beginners - An Introduction to Artificial Intelligence and Machine Learning (Hardcover): John Slavio Machine Learning for Beginners - An Introduction to Artificial Intelligence and Machine Learning (Hardcover)
John Slavio
R828 Discovery Miles 8 280 Ships in 18 - 22 working days
Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover): Gulshan Shrivastava, Deepak... Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover)
Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
R4,522 Discovery Miles 45 220 Ships in 10 - 15 working days

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

Excel 2021 / Microsoft 365 Programming By Example (Paperback): Julitta Korol Excel 2021 / Microsoft 365 Programming By Example (Paperback)
Julitta Korol
R1,437 R1,215 Discovery Miles 12 150 Save R222 (15%) Ships in 18 - 22 working days

Updated for Excel 2021 and based on the bestselling editions from previous versions, Excel 2021 / Microsoft 365 Programming by Example is a practical, how-to book on Excel programming, suitable for readers already proficient with the Excel user interface. If you are looking to automate Excel routine tasks, this book will progressively introduce you to programming concepts via numerous illustrated hands-on exercises. More advanced topics are demonstrated via custom projects. From recording and editing a macro and writing VBA code from scratch to programming the Ribbon interface and working with XML documents, this book takes you on a programming journey that will change the way you work with Excel. The book provides information on performing automatic operations on files, folders, and other Microsoft Office applications. It also covers proper use of event procedures, testing and debugging, and guides you through programming more advanced Excel features, such as working with VBA classes and raising your own events in standalone class modules. Includes companion files with source code, hands-on projects, and figures.

Solving the Riddle of Microsoft and Your Computer - 2Nd Edition (Hardcover): Mark Riddle Solving the Riddle of Microsoft and Your Computer - 2Nd Edition (Hardcover)
Mark Riddle
R574 Discovery Miles 5 740 Ships in 18 - 22 working days
Handbook of Reconfigurable Computing: Volume II (Hardcover): Akira Hanako Handbook of Reconfigurable Computing: Volume II (Hardcover)
Akira Hanako
R3,163 R2,865 Discovery Miles 28 650 Save R298 (9%) Ships in 18 - 22 working days
The Silence of Slime Mould (Hardcover): Andrew Adamatzky The Silence of Slime Mould (Hardcover)
Andrew Adamatzky
R584 Discovery Miles 5 840 Ships in 10 - 15 working days
Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.): Jan... Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.)
Jan Schaffner
R2,953 R1,782 Discovery Miles 17 820 Save R1,171 (40%) Ships in 10 - 15 working days

With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.

Special Applications of ICTs in Digital Government and the Public Sector - Emerging Research and Opportunities (Hardcover):... Special Applications of ICTs in Digital Government and the Public Sector - Emerging Research and Opportunities (Hardcover)
Manuel Pedro Rodriguez-Bolivar, Maria Elicia Cortes Cediel
R5,299 Discovery Miles 52 990 Ships in 18 - 22 working days

The development of social technologies has brought about a new era of political planning and government interactions. In addition to reducing costs in city resource management, ICT and social media can be used in emergency situations as a mechanism for citizen engagement, to facilitate public administration communication, etc. In spite of all these advantages, the application of technologies by governments and the public sector has also fostered debate in terms of cyber security due to the vulnerabilities and risks that can befall different stakeholders. It is necessary to review the most recent research about the implementation of ICTs in the public sector with the aim of understanding both the strengths and the vulnerabilities that the management models can entail. Special Applications of ICTs in Digital Government and the Public Sector: Emerging Research and Opportunities is a collection of innovative research on the methods and applications of ICT implementation in the public sector that seeks to allow readers to understand how ICTs have forced public administrations to undertake reforms to both their workflow and their means of interacting with citizens. While highlighting topics including e-government, emergency communications, and urban planning, this book is ideally designed for government officials, public administrators, public managers, policy holders, policymakers, public consultants, professionals, academicians, students, and researchers seeking current research on the digital communication channels between elected officials and the citizens they represent.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback)
James Aweya
R5,034 Discovery Miles 50 340 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover)
James Aweya
R12,552 Discovery Miles 125 520 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Scheduling in Real-Time Systems (Hardcover): F. Cottet Scheduling in Real-Time Systems (Hardcover)
F. Cottet
R4,101 Discovery Miles 41 010 Ships in 18 - 22 working days

Real-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today.

Scheduling in Real-Time Systems presents:

  • Rigorous discussions of the main scheduling algorithms.

  • In-depth analyses of centralised and distributed computing systems.

  • Detailed coverage of symmetric multiprocessor systems sharing a common memory.

  • A complete appraisal of packet scheduling in networks.

  • Three relevant case studies including the control system of the robot that the Pathfinder space vehicle landed on Planet Mars.
Offering end-of-chapter exercises and solutions, Scheduling in Real-time Systems will prove an invaluable textbook for university students in computer, software, electronics and control systems engineering. This book will also be an excellent reference to practising engineers and developers in the systems and communications industry.
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Turning Point - The Arab World's…
Robert Daniel Tschirgi Hardcover R1,643 R1,442 Discovery Miles 14 420
Israel-Palestine - A Guerrilla Conflict…
Eliezer Ben Rafael Hardcover R2,804 R2,538 Discovery Miles 25 380
Violent Extremism - A Primer for Mental…
Caroline Logan Hardcover R4,208 Discovery Miles 42 080
Recent Developments in Embryo Transfer
Leonard Roosevelt Hardcover R2,509 R2,287 Discovery Miles 22 870
The Mathematical and Philosophical Works…
John Wilkins Paperback R711 Discovery Miles 7 110
White Terror - The Ku Klux Klan…
Allen W Trelease Hardcover R3,433 R3,070 Discovery Miles 30 700
The Post-Utopian Imagination - American…
M. Keith Booker Hardcover R2,803 R2,537 Discovery Miles 25 370
Systems Analysis And Design
Scott Tilley Hardcover R1,302 R1,149 Discovery Miles 11 490
Funding Extended Conflicts - Korea…
Richard M Miller Hardcover R1,767 Discovery Miles 17 670
A Careful and Strict Enquiry Into the…
Jonathan Edwards Paperback R501 Discovery Miles 5 010

 

Partners