0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (41)
  • R250 - R500 (210)
  • R500+ (7,932)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Design and Use of Virtualization Technology in Cloud Computing (Hardcover): Prashanta Kumar Das, Ganesh Chandra Deka Design and Use of Virtualization Technology in Cloud Computing (Hardcover)
Prashanta Kumar Das, Ganesh Chandra Deka
R5,771 Discovery Miles 57 710 Ships in 18 - 22 working days

Cloud computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Design and Use of Virtualization Technology in Cloud Computing is a crucial resource that provides in-depth discussions on the background of virtualization, and the ways it can help shape the future of cloud computing technologies. Highlighting relevant topics including grid computing, mobile computing, open source virtualization, and virtualization in education, this scholarly reference source is ideal for computer engineers, academicians, students, and researchers that are interested in learning more about how to infuse current cloud computing technologies with virtualization advancements.

AWS Encryption SDK Developer Guide (Hardcover): Documentation Team AWS Encryption SDK Developer Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover): Suyel Namasudra, Hamid Sarbazi-Azad Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover)
Suyel Namasudra, Hamid Sarbazi-Azad
R4,212 Discovery Miles 42 120 Ships in 10 - 15 working days

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,380 Discovery Miles 53 800 Ships in 18 - 22 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R6,677 Discovery Miles 66 770 Ships in 18 - 22 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback): Sushil K. Prasad,... Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback)
Sushil K. Prasad, Anshul Gupta, Arnold L. Rosenberg, Alan Sussman, Charles C Weems, Jr.
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.

AWS Secrets Manager User Guide (Hardcover): Documentation Team AWS Secrets Manager User Guide (Hardcover)
Documentation Team
R1,158 Discovery Miles 11 580 Ships in 18 - 22 working days
AWS Direct Connect User Guide (Hardcover): Documentation Team AWS Direct Connect User Guide (Hardcover)
Documentation Team
R891 Discovery Miles 8 910 Ships in 18 - 22 working days
Internet Congestion Control (Paperback): Subir Varma Internet Congestion Control (Paperback)
Subir Varma
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.

Open and Equal Access for Learning in School Management (Hardcover): Fahriye Altinay Open and Equal Access for Learning in School Management (Hardcover)
Fahriye Altinay
R3,104 Discovery Miles 31 040 Ships in 18 - 22 working days
Amazon Sumerian User Guide (Hardcover): Documentation Team Amazon Sumerian User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

AWS X-Ray Developer Guide (Hardcover): Development Team AWS X-Ray Developer Guide (Hardcover)
Development Team
R1,190 Discovery Miles 11 900 Ships in 18 - 22 working days
A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Shaping Future 6G Networks - Needs, Impacts and Technologies (Hardcover): E Bertin Shaping Future 6G Networks - Needs, Impacts and Technologies (Hardcover)
E Bertin
R3,160 Discovery Miles 31 600 Ships in 18 - 22 working days

Shaping Future 6G Networks Discover the societal and technology drivers contributing to build the next generation of wireless telecommunication networks Shaping Future 6G Networks: Needs, Impacts, and Technologies is a holistic snapshot on the evolution of 5G technologies towards 6G. With contributions from international key players in industry and academia, the book presents the hype versus the realistic capabilities of 6G technologies, and delivers cutting-edge business and technological insights into the future wireless telecommunications landscape. You'll learn about: Forthcoming demand for post 5G networks, including new requirements coming from small and large businesses, manufacturing, logistics, and automotive industry Societal implications of 6G, including digital sustainability, strategies for increasing energy efficiency, as well as future open networking ecosystems Impacts of integrating non-terrestrial networks to build the 6G architecture Opportunities for emerging THz radio access technologies in future integrated communications, positioning, and sensing capabilities in 6G Design of highly modular and distributed 6G core networks driven by the ongoing RAN-Core integration and the benefits of AI/ML-based control and management Disruptive architectural considerations influenced by the Post-Shannon Theory The insights in Shaping Future 6G Networks will greatly benefit IT engineers and managers focused on the future of networking, as well as undergraduate and graduate engineering students focusing on the design, implementation, and management of mobile networks and applications.

AWS Marketplace User Guide (Hardcover): Documentation Team AWS Marketplace User Guide (Hardcover)
Documentation Team
R1,134 Discovery Miles 11 340 Ships in 18 - 22 working days
Selfies as a Mode of Social Media and Work Space Research (Hardcover): Shalin Hai-Jew Selfies as a Mode of Social Media and Work Space Research (Hardcover)
Shalin Hai-Jew
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.

Amazon Inspector User Guide (Hardcover): Documentation Team Amazon Inspector User Guide (Hardcover)
Documentation Team
R886 Discovery Miles 8 860 Ships in 18 - 22 working days
Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover): Veljko Milutinovic, Milos Kotlar Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover)
Veljko Milutinovic, Milos Kotlar
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing.

Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover): J. Jackson Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover)
J. Jackson
R2,573 Discovery Miles 25 730 Ships in 18 - 22 working days

CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

AWS CodeCommit User Guide (Hardcover): Documentation Team AWS CodeCommit User Guide (Hardcover)
Documentation Team
R1,201 Discovery Miles 12 010 Ships in 18 - 22 working days
Information Systems: A Digital World (Hardcover): Brian Jackson Information Systems: A Digital World (Hardcover)
Brian Jackson
R2,818 R2,564 Discovery Miles 25 640 Save R254 (9%) Ships in 18 - 22 working days
AWS Step Functions Developer Guide (Hardcover): Documentation Team AWS Step Functions Developer Guide (Hardcover)
Documentation Team
R1,156 Discovery Miles 11 560 Ships in 18 - 22 working days
Cloud Computing (Hardcover): Sam Revere Cloud Computing (Hardcover)
Sam Revere
R3,029 R2,745 Discovery Miles 27 450 Save R284 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,276 Discovery Miles 92 760
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Cloud Computing Applications and…
Saikat Gochhait, David Tawei Shou, … Hardcover R5,931 Discovery Miles 59 310
Blockchain Technology in Corporate…
K Sood Hardcover R4,308 Discovery Miles 43 080
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180

 

Partners