![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West's completely updated NETWORK+ GUIDE TO NETWORKS, 9E. This resource thoroughly prepares you for success on the latest CompTIA's Network+ N10-008 certification exam as content corresponds to all exam objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Detailed, step-by-step instructions as well as cloud, virtualization and simulation projects give you experience working with a variety of hardware, software and operating systems as well as device interactions. Stories from professionals on the job, insightful discussion prompts, hands-on activities, applications and projects all guide you in exploring key concepts in-depth. You gain the problem-solving tools for any computing environment. MindTap digital resources are also available for additional practice and certification prep.
Packed with hands-on learning tools, Tomsho's GUIDE TO NETWORKING ESSENTIALS, Eighth Edition, equips you with the knowledge and skills to work with network infrastructure devices and network operating systems in a small to medium-size network environment. Focusing on troubleshooting and computer networking technologies, it delivers a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies. It reflects the latest networking technologies and operating systems, covers new Ethernet standards, includes an Internet of Things (IoT) chapter and adds certification mapping to the Microsoft Technology Associate (MTA Exam 98-366) in Networking Fundamentals. Maximizing your success, virtual labs and the MindTap digital learning solution give you ample opportunities to put what you learn into practice and prep for the certification test.
This book tackles online social networks by navigating these
systems from the birth to the death of their digital presence.
Navigating the social within the digital can be a contentious
undertaking, as social networks confuse the boundary between
offline and online relationships. These systems work to bring
people together in an online environment, yet participation can
dislocate users from other relationships and deviant online
behaviour can create offline issues. The author begins by examining
the creation of a digital presence in online networks popularized
by websites such as Facebook and MySpace. The book explores how the
digital presence influences how social, cultural and professional
relationships are discovered, forged, maintained and broken, and
journeys through the popular criticisms of social networking such
as employee time-wasting, bullying, stalking, the alleged links
between social networks and suicide and the decline of a user s
public image. Social networks are often treated as morally
ambiguous spaces, which highlights a dissonance between digital and
social literacies. This discord is approached through an
exploration of the everyday undercurrents present in social
networks. The discussion of the digital presence ends by addressing
the intricacies of becoming digitally dead, which explores how a
user removes their identity, with finality, from social networks
and the entire web.
The objective of this book is to outline the best practice in
designing, installing, commissioning and troubleshooting industrial
data communications systems. In any given plant, factory or
installation there are a myriad of different industrial
communications standards used and the key to successful
implementation is the degree to which the entire system integrates
and works together.
A uniquely practical DSP text, this book gives a thorough
understanding of the principles and applications of DSP with a
minimum of mathematics, and provides the reader with an
introduction to DSP applications in telecoms, control engineering
and measurement and data analysis systems.
There are many data communications titles covering design,
installation, etc, but almost none that specifically focus on
industrial networks, which are an essential part of the day-to-day
work of industrial control systems engineers, and the main focus of
an increasingly large group of network specialists.
Because this is a book for engineers the practical coverage is
reinforced by use of the latest interanational standards, in
particular BICSI standards (USA and international) and EU
requirements. This will make the book ideal for the large number of
industry-based training courses. Coverage has also been matched to
the requirements of the revised City & Guilds 3466-04 course.
CCNA Interactive Learning: More than 300 labs More than 4,000 hands-on tasks Four Kinds of Labs: Skill Builders Subnetting Exercises Configuration Scenarios Troubleshooting Scenarios The CCNA 200-301 Network Simulator is a single-user software package. It helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software enables you to practice your networking skills with more than 300 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device responses as you perform each lab, which include detailed instructions, topology diagrams, critical-thinking questions, hints, and answers. Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCNA exam. Unlike other simulators on the market, the lab scenarios included in the CCNA 200-301 Network Simulator are far more complex, challenging you to learn how to perform real-world network configuration and troubleshooting tasks. Master the hands-on skills needed to succeed on the CCNA exam, including: Network fundamentals Network access IP connectivity IP services Security fundamentals IP Subnetting Skill Builders: These 175+ labs are narrowly focused, enabling you to practice your configuration skills on a single topic. Coverage includes: Interface settings and status Router and Switch CLI Exec Mode and config process Telnet, Ping, Traceroute, and terminal history Switch IP address, connectivity, and forwarding PC IP commands Configuring IP addresses Subnet Zero IP addressing and IPv6 address configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP and MLS Static and Dynamic EtherChannel Wireless LAN Controllers Connected, static, and default routes OSPF SSH NAT NTP Router and switch security fundamentals ACL CHCP Dynamic ARP Port security IOS backup Subnetting Exercises: These 80 labs help you to perform subnetting calculations quickly and accurately, a critical skill for success on the CCNA exam. Topics covered include: IPv4 and IPv6 subnet ID calculation IP address rejection IP route selection VLSM overlaps IPv6 EUI-64 calculation Selecting VLSM routes Configuration Scenarios: These 40+ labs are more broadly focused, combining multiple technologies into configuration scenarios that mimic real-world environments. These labs are longer and more complex,challenging you to put your configuration skills to the test. Topics covered include: IP and MAC comparisons Switch IP connectivity and security Subnetting and addressing IP addressing and configuration IPv6 configuraiton Switch interfaces and forwarding VLAN trunking STP analysis, configuration, and prediction Wireless LAN Controllers Static routing Configuring default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL Password recovery Rebuilding a configuration Troubleshooting Scenarios: These 18 labs present typical troubleshooting scenarios and require you to explore the misconfigured network, isolate the issues, and correct the problems. These are very complicated and realistic scenarios that truly test your ability to perform the job of a network engineer. Topics covered include: Switch forwarding Path analysis and troubleshooting IPv4/IPv6 addressing IP routing OSPF VLAN troubleshooting STP Network discovery Port security System requirements: Operating Systems: Windows 10 (32/64 bit) Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14 (Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB (minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz (minimum) and above Software Pre-requisites: Node JS 10 PDF reader Monitor resolution: Minimum resolution: 1024 X 768 Best viewed: 1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed only during software activation, reporting feedback and receiving updates. After activation, Internet is not needed for accessing the labs in the application. Language: English (US)
With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to create huge sets of poly-structured digital data. Corporations are continuously seeking fresh ways to use their data to drive business innovations and disruptions to bring in real digital transformation. Data science (DS) is proving to be the one-stop solution for simplifying the process of knowledge discovery and dissemination out of massive amounts of multi-structured data. Supported by query languages, databases, algorithms, platforms, analytics methods and machine and deep learning (ML and DL) algorithms, graphs are now emerging as a new data structure for optimally representing a variety of data and their intimate relationships. Compared to traditional analytics methods, the connectedness of data points in graph analytics facilitates the identification of clusters of related data points based on levels of influence, association, interaction frequency and probability. Graph analytics is being empowered through a host of path-breaking analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book aims to explain the various aspects and importance of graph data science. The authors from both academia and industry cover algorithms, analytics methods, platforms and databases that are intrinsically capable of creating business value by intelligently leveraging connected data. This book will be a valuable reference for ICTs industry and academic researchers, scientists and engineers, and lecturers and advanced students in the fields of data analytics, data science, cloud/fog/edge architecture, internet of things, artificial intelligence/machine and deep learning, and related fields of applications. It will also be of interest to analytics professionals in industry and IT operations teams.
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
Since the advent of the internet, online communities have emerged as a way for users to share their common interests and connect with others with ease. As the possibilities of the online world grew and the COVID-19 pandemic raged across the world, many organizations recognized the utility in not only providing further services online, but also in transitioning operations typically fulfilled in-person to an online space. As society approaches a reality in which most community practices have moved to online spaces, it is essential that community leaders remain knowledgeable on the best practices in cultivating engagement. Community Engagement in the Online Space evaluates key issues and practices pertaining to community engagement in remote settings. It analyzes various community engagement efforts within remote education, online groups, and remote work. This book further reviews the best practices for community engagement and considerations for the optimization of these practices for effective virtual delivery to support emergency environmental challenges, such as pandemic conditions. Covering topics such as community belonging, global health virtual practicum, and social media engagement, this premier reference source is an excellent resource for program directors, faculty and administrators of both K-12 and higher education, students of higher education, business leaders and executives, IT professionals, online community moderators, librarians, researchers, and academicians.
BLOCKCHAIN TECHNOLOGY IN CORPORATE GOVERANCE This book investigates the recent applications of blockchain technology in financial services, energy sector, and summarizes regulatory responses, to set the scene for future work on corporate governance. This edited book highlights the current governance framework for the blockchain and its development as a self-governing framework. It discusses blockchain technology's effectiveness in developing solutions for supply chains, trade finance, and banking. Moreover, it shows how banking and financial institutions are the major beneficiaries of this decentralized technology. Furthermore, the book outlines the link between company governance theories, regulatory, ethical, and social controls, and blockchain adoption. It also investigates the recent applications of blockchain technology in financial services, the health sector, and the energy sector. Audience The book is specially designed for researchers, industrialists, engineers, graduate students, and policymakers, who aspire to learn, discuss, and carry out further research into the opportunities offered by blockchain and the possible ways of regulating it.
Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results. Written by a highly qualified author with significant experience in the field, Network Science also includes information on: Sub-networks, covering connected components, bi-connected components, community detection, k-core decomposition, reach network, projection, nodes similarity and pattern matching Network centrality measures, covering degree, influence, clustering coefficient, closeness, betweenness, eigenvector, PageRank, hub and authority Network optimization, covering clique, cycle, linear assignment, minimum-cost network flow, maximum network flow problem, minimum cut, minimum spanning tree, path, shortest path, transitive closure, traveling salesman problem, vehicle routing problem and topological sort With in-depth and authoritative coverage of the subject and many case studies to convey concepts clearly, Network Science is a helpful training resource for professional and industry workers in, telecommunications, insurance, retail, banking, healthcare, public sector, among others, plus as a supplementary reading for an introductory Network Science course for undergraduate students.
The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.
Many professional fields have been affected by the rapid growth of technology and information. Included in this are the business and management markets as the implementation of e-commerce and cloud computing have caused enterprises to make considerable changes to their practices. With the swift advancement of this technology, professionals need proper research that provides solutions to the various issues that come with data integration and shifting to a technology-driven environment. Cloud Computing Applications and Techniques for E-Commerce is an essential reference source that discusses the implementation of data and cloud technology within the fields of business and information management. Featuring research on topics such as content delivery networks, virtualization, and software resources, this book is ideally designed for managers, educators, administrators, researchers, computer scientists, business practitioners, economists, information analysists, sociologists, and students seeking coverage on the recent advancements of e-commerce using cloud computing techniques.
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.
Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.
Data Communications and Networking, 6th Edition, teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the TCP/IP protocol suite is built on the services provided by the layer below. This edition has undergone a major restructuring to reduce the number of chapters and focus on the organization of TCP/IP protocol suite. It concludes with three chapters that explore multimedia, network management, and cryptography/network security. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Data Communications and Networking.
Deep Reinforcement Learning for Wireless Communications and Networking Comprehensive guide to Deep Reinforcement Learning (DRL) as applied to wireless communication systems Deep Reinforcement Learning for Wireless Communications and Networking presents an overview of the development of DRL while providing fundamental knowledge about theories, formulation, design, learning models, algorithms and implementation of DRL together with a particular case study to practice. The book also covers diverse applications of DRL to address various problems in wireless networks, such as caching, offloading, resource sharing, and security. The authors discuss open issues by introducing some advanced DRL approaches to address emerging issues in wireless communications and networking. Covering new advanced models of DRL, e.g., deep dueling architecture and generative adversarial networks, as well as emerging problems considered in wireless networks, e.g., ambient backscatter communication, intelligent reflecting surfaces and edge intelligence, this is the first comprehensive book studying applications of DRL for wireless networks that presents the state-of-the-art research in architecture, protocol, and application design. Deep Reinforcement Learning for Wireless Communications and Networking covers specific topics such as: Deep reinforcement learning models, covering deep learning, deep reinforcement learning, and models of deep reinforcement learning Physical layer applications covering signal detection, decoding, and beamforming, power and rate control, and physical-layer security Medium access control (MAC) layer applications, covering resource allocation, channel access, and user/cell association Network layer applications, covering traffic routing, network classification, and network slicing With comprehensive coverage of an exciting and noteworthy new technology, Deep Reinforcement Learning for Wireless Communications and Networking is an essential learning resource for researchers and communications engineers, along with developers and entrepreneurs in autonomous systems, who wish to harness this technology in practical applications.
Industrial internet of things (IIoT) is changing the face of industry by completely redefining the way stakeholders, enterprises, and machines connect and interact with each other in the industrial digital ecosystem. Smart and connected factories, in which all the machinery transmits real-time data, enable industrial data analytics for improving operational efficiency, productivity, and industrial processes, thus creating new business opportunities, asset utilization, and connected services. IIoT leads factories to step out of legacy environments and arcane processes towards open digital industrial ecosystems. Innovations in the Industrial Internet of Things (IIoT) and Smart Factory is a pivotal reference source that discusses the development of models and algorithms for predictive control of industrial operations and focuses on optimization of industrial operational efficiency, rationalization, automation, and maintenance. While highlighting topics such as artificial intelligence, cyber security, and data collection, this book is ideally designed for engineers, manufacturers, industrialists, managers, IT consultants, practitioners, students, researchers, and industrial industry professionals. |
You may like...
Our Words, Our Worlds - Writing On Black…
Makhosazana Xaba
Paperback
Reading Planet - Brilliant Braille…
Adam Guillain, Charlotte Guillain
Paperback
R263
Discovery Miles 2 630
|