![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Packed with hands-on learning tools, Tomsho's GUIDE TO NETWORKING ESSENTIALS, Eighth Edition, equips you with the knowledge and skills to work with network infrastructure devices and network operating systems in a small to medium-size network environment. Focusing on troubleshooting and computer networking technologies, it delivers a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies. It reflects the latest networking technologies and operating systems, covers new Ethernet standards, includes an Internet of Things (IoT) chapter and adds certification mapping to the Microsoft Technology Associate (MTA Exam 98-366) in Networking Fundamentals. Maximizing your success, virtual labs and the MindTap digital learning solution give you ample opportunities to put what you learn into practice and prep for the certification test.
Optimization of Manufacturing Systems Using the Internet of Things extends the IoT (Internet of Things) into the manufacturing field to develop an IoMT (Internet of Manufacturing Things) architecture with real-time traceability, visibility, and interoperability in production planning, execution, and control. This book is essential reading for anyone interested in the optimization and control of an intelligent manufacturing system. As modern manufacturing shop-floors can create bottlenecks in the capturing and collection of real-time field information, and because paper-based manual systems are time-consuming and prone to errors, this book helps readers understand how to alleviate these issues, assisting them in their decision-making on shop-floors.
This book tackles online social networks by navigating these
systems from the birth to the death of their digital presence.
Navigating the social within the digital can be a contentious
undertaking, as social networks confuse the boundary between
offline and online relationships. These systems work to bring
people together in an online environment, yet participation can
dislocate users from other relationships and deviant online
behaviour can create offline issues. The author begins by examining
the creation of a digital presence in online networks popularized
by websites such as Facebook and MySpace. The book explores how the
digital presence influences how social, cultural and professional
relationships are discovered, forged, maintained and broken, and
journeys through the popular criticisms of social networking such
as employee time-wasting, bullying, stalking, the alleged links
between social networks and suicide and the decline of a user s
public image. Social networks are often treated as morally
ambiguous spaces, which highlights a dissonance between digital and
social literacies. This discord is approached through an
exploration of the everyday undercurrents present in social
networks. The discussion of the digital presence ends by addressing
the intricacies of becoming digitally dead, which explores how a
user removes their identity, with finality, from social networks
and the entire web.
The objective of this book is to outline the best practice in
designing, installing, commissioning and troubleshooting industrial
data communications systems. In any given plant, factory or
installation there are a myriad of different industrial
communications standards used and the key to successful
implementation is the degree to which the entire system integrates
and works together.
A uniquely practical DSP text, this book gives a thorough
understanding of the principles and applications of DSP with a
minimum of mathematics, and provides the reader with an
introduction to DSP applications in telecoms, control engineering
and measurement and data analysis systems.
There are many data communications titles covering design,
installation, etc, but almost none that specifically focus on
industrial networks, which are an essential part of the day-to-day
work of industrial control systems engineers, and the main focus of
an increasingly large group of network specialists.
Because this is a book for engineers the practical coverage is
reinforced by use of the latest interanational standards, in
particular BICSI standards (USA and international) and EU
requirements. This will make the book ideal for the large number of
industry-based training courses. Coverage has also been matched to
the requirements of the revised City & Guilds 3466-04 course.
This book provides a complete guide to the design, procurement,
installation and testing procedures for local area networks (LANs)
using both copper and optical fibre cable technology.
International, European and American LAN and premises cabling
standards are explained and compared including the latest Category
5, Category 6 and Category 7 proposals. The latest standards in
testing, electromagnetic compatibility (EMC) compliance and fire
safety are also covered in detail.
The main links with your PC and the outside world are the centronic
port, used for connecting the printer, the RS232 port, used for the
mouse, and the games port for a joystick. This book explores how
these input/output (I/O) ports can be put to use through a range of
other interfacing applications. This is especially useful for
laptop and palmtop PCs which cannot be fitted with internal I/O
cards. A novel approach is taken by this book, combining the
hardware through which the ports can be explored, and the software
programming needed to carry out a range of experiments.
The papers in this volume consider a general area of study known as network routing. The underlying problems are conceptually simple, yet mathematically complex and challenging. How can we best route material or people from one place to another? Or, how can we best design a system (for instance locate facilities) to provide services and goods as efficiently and equitably as possible? The problems encountered in answering these questions often have an underlying combinatorial structure, for example, either we dispatch a vehicle or we do not, or we use one particular route or another. The problems also typically have an underlying network structure (a communication or transportation network). In addition, models for these problems are often very large with hundreds or thousands of constraints and variables. A companion volume in the "Handbook" series, entitled "Network Models", treats basic network models such as minimum cost flows, matching and the travelling salesman problem, as well as, several complex network topics, not directly related to routing, such as network design and network reliability.
CCNA Interactive Learning: More than 300 labs More than 4,000 hands-on tasks Four Kinds of Labs: Skill Builders Subnetting Exercises Configuration Scenarios Troubleshooting Scenarios The CCNA 200-301 Network Simulator is a single-user software package. It helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software enables you to practice your networking skills with more than 300 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device responses as you perform each lab, which include detailed instructions, topology diagrams, critical-thinking questions, hints, and answers. Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCNA exam. Unlike other simulators on the market, the lab scenarios included in the CCNA 200-301 Network Simulator are far more complex, challenging you to learn how to perform real-world network configuration and troubleshooting tasks. Master the hands-on skills needed to succeed on the CCNA exam, including: Network fundamentals Network access IP connectivity IP services Security fundamentals IP Subnetting Skill Builders: These 175+ labs are narrowly focused, enabling you to practice your configuration skills on a single topic. Coverage includes: Interface settings and status Router and Switch CLI Exec Mode and config process Telnet, Ping, Traceroute, and terminal history Switch IP address, connectivity, and forwarding PC IP commands Configuring IP addresses Subnet Zero IP addressing and IPv6 address configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP and MLS Static and Dynamic EtherChannel Wireless LAN Controllers Connected, static, and default routes OSPF SSH NAT NTP Router and switch security fundamentals ACL CHCP Dynamic ARP Port security IOS backup Subnetting Exercises: These 80 labs help you to perform subnetting calculations quickly and accurately, a critical skill for success on the CCNA exam. Topics covered include: IPv4 and IPv6 subnet ID calculation IP address rejection IP route selection VLSM overlaps IPv6 EUI-64 calculation Selecting VLSM routes Configuration Scenarios: These 40+ labs are more broadly focused, combining multiple technologies into configuration scenarios that mimic real-world environments. These labs are longer and more complex,challenging you to put your configuration skills to the test. Topics covered include: IP and MAC comparisons Switch IP connectivity and security Subnetting and addressing IP addressing and configuration IPv6 configuraiton Switch interfaces and forwarding VLAN trunking STP analysis, configuration, and prediction Wireless LAN Controllers Static routing Configuring default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL Password recovery Rebuilding a configuration Troubleshooting Scenarios: These 18 labs present typical troubleshooting scenarios and require you to explore the misconfigured network, isolate the issues, and correct the problems. These are very complicated and realistic scenarios that truly test your ability to perform the job of a network engineer. Topics covered include: Switch forwarding Path analysis and troubleshooting IPv4/IPv6 addressing IP routing OSPF VLAN troubleshooting STP Network discovery Port security System requirements: Operating Systems: Windows 10 (32/64 bit) Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14 (Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB (minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz (minimum) and above Software Pre-requisites: Node JS 10 PDF reader Monitor resolution: Minimum resolution: 1024 X 768 Best viewed: 1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed only during software activation, reporting feedback and receiving updates. After activation, Internet is not needed for accessing the labs in the application. Language: English (US)
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
BLOCKCHAIN TECHNOLOGY IN CORPORATE GOVERANCE This book investigates the recent applications of blockchain technology in financial services, energy sector, and summarizes regulatory responses, to set the scene for future work on corporate governance. This edited book highlights the current governance framework for the blockchain and its development as a self-governing framework. It discusses blockchain technology's effectiveness in developing solutions for supply chains, trade finance, and banking. Moreover, it shows how banking and financial institutions are the major beneficiaries of this decentralized technology. Furthermore, the book outlines the link between company governance theories, regulatory, ethical, and social controls, and blockchain adoption. It also investigates the recent applications of blockchain technology in financial services, the health sector, and the energy sector. Audience The book is specially designed for researchers, industrialists, engineers, graduate students, and policymakers, who aspire to learn, discuss, and carry out further research into the opportunities offered by blockchain and the possible ways of regulating it.
Since the advent of the internet, online communities have emerged as a way for users to share their common interests and connect with others with ease. As the possibilities of the online world grew and the COVID-19 pandemic raged across the world, many organizations recognized the utility in not only providing further services online, but also in transitioning operations typically fulfilled in-person to an online space. As society approaches a reality in which most community practices have moved to online spaces, it is essential that community leaders remain knowledgeable on the best practices in cultivating engagement. Community Engagement in the Online Space evaluates key issues and practices pertaining to community engagement in remote settings. It analyzes various community engagement efforts within remote education, online groups, and remote work. This book further reviews the best practices for community engagement and considerations for the optimization of these practices for effective virtual delivery to support emergency environmental challenges, such as pandemic conditions. Covering topics such as community belonging, global health virtual practicum, and social media engagement, this premier reference source is an excellent resource for program directors, faculty and administrators of both K-12 and higher education, students of higher education, business leaders and executives, IT professionals, online community moderators, librarians, researchers, and academicians.
With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to create huge sets of poly-structured digital data. Corporations are continuously seeking fresh ways to use their data to drive business innovations and disruptions to bring in real digital transformation. Data science (DS) is proving to be the one-stop solution for simplifying the process of knowledge discovery and dissemination out of massive amounts of multi-structured data. Supported by query languages, databases, algorithms, platforms, analytics methods and machine and deep learning (ML and DL) algorithms, graphs are now emerging as a new data structure for optimally representing a variety of data and their intimate relationships. Compared to traditional analytics methods, the connectedness of data points in graph analytics facilitates the identification of clusters of related data points based on levels of influence, association, interaction frequency and probability. Graph analytics is being empowered through a host of path-breaking analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book aims to explain the various aspects and importance of graph data science. The authors from both academia and industry cover algorithms, analytics methods, platforms and databases that are intrinsically capable of creating business value by intelligently leveraging connected data. This book will be a valuable reference for ICTs industry and academic researchers, scientists and engineers, and lecturers and advanced students in the fields of data analytics, data science, cloud/fog/edge architecture, internet of things, artificial intelligence/machine and deep learning, and related fields of applications. It will also be of interest to analytics professionals in industry and IT operations teams.
Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results. Written by a highly qualified author with significant experience in the field, Network Science also includes information on: Sub-networks, covering connected components, bi-connected components, community detection, k-core decomposition, reach network, projection, nodes similarity and pattern matching Network centrality measures, covering degree, influence, clustering coefficient, closeness, betweenness, eigenvector, PageRank, hub and authority Network optimization, covering clique, cycle, linear assignment, minimum-cost network flow, maximum network flow problem, minimum cut, minimum spanning tree, path, shortest path, transitive closure, traveling salesman problem, vehicle routing problem and topological sort With in-depth and authoritative coverage of the subject and many case studies to convey concepts clearly, Network Science is a helpful training resource for professional and industry workers in, telecommunications, insurance, retail, banking, healthcare, public sector, among others, plus as a supplementary reading for an introductory Network Science course for undergraduate students.
The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wireless sensor networks and cellular networks. For wireless sensor networks, the book presents approaches using mobile robots or UAVs to collect sensory data from sensor nodes. For cellular networks, it discusses the approaches to using UAVs to work as aerial base stations to serve cellular users. In addition, the book covers the challenges involved in these two networks, existing approaches (e.g., how to use the public transportation vehicles to play the role of mobile sinks to collect sensory data from sensor nodes), and potential methods to address open questions.
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.
Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.
Deep Reinforcement Learning for Wireless Communications and Networking Comprehensive guide to Deep Reinforcement Learning (DRL) as applied to wireless communication systems Deep Reinforcement Learning for Wireless Communications and Networking presents an overview of the development of DRL while providing fundamental knowledge about theories, formulation, design, learning models, algorithms and implementation of DRL together with a particular case study to practice. The book also covers diverse applications of DRL to address various problems in wireless networks, such as caching, offloading, resource sharing, and security. The authors discuss open issues by introducing some advanced DRL approaches to address emerging issues in wireless communications and networking. Covering new advanced models of DRL, e.g., deep dueling architecture and generative adversarial networks, as well as emerging problems considered in wireless networks, e.g., ambient backscatter communication, intelligent reflecting surfaces and edge intelligence, this is the first comprehensive book studying applications of DRL for wireless networks that presents the state-of-the-art research in architecture, protocol, and application design. Deep Reinforcement Learning for Wireless Communications and Networking covers specific topics such as: Deep reinforcement learning models, covering deep learning, deep reinforcement learning, and models of deep reinforcement learning Physical layer applications covering signal detection, decoding, and beamforming, power and rate control, and physical-layer security Medium access control (MAC) layer applications, covering resource allocation, channel access, and user/cell association Network layer applications, covering traffic routing, network classification, and network slicing With comprehensive coverage of an exciting and noteworthy new technology, Deep Reinforcement Learning for Wireless Communications and Networking is an essential learning resource for researchers and communications engineers, along with developers and entrepreneurs in autonomous systems, who wish to harness this technology in practical applications.
The cybersecurity of connected medical devices is one of the biggest challenges facing healthcare today. The compromise of a medical device can result in severe consequences for both patient health and patient data. Cybersecurity for Connected Medical Devices covers all aspects of medical device cybersecurity, with a focus on cybersecurity capability development and maintenance, system and software threat modeling, secure design of medical devices, vulnerability management, and integrating cybersecurity design aspects into a medical device manufacturer's Quality Management Systems (QMS). This book is geared towards engineers interested in the medical device cybersecurity space, regulatory, quality, and human resources specialists, and organizational leaders interested in building a medical device cybersecurity program. |
You may like...
Advancing Information Management through…
Patricia Ordonez De Pablos, Hector Oscar Nigro, …
Hardcover
R4,854
Discovery Miles 48 540
Data-driven Detection and Diagnosis of…
Hongtian Chen, Bin Jiang, …
Hardcover
R2,653
Discovery Miles 26 530
Carmina Gadelica - Hymns and…
Alexander 1832-1912 Comp Carmichael
Hardcover
R921
Discovery Miles 9 210
Reunifying Cyprus - The Annan Plan and…
Andrekos Varnava, Hubert Faustmann
Hardcover
R4,319
Discovery Miles 43 190
|