Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
This book focuses on methods for service-differentiated and constraint-based wavelength routing and resource allocation for multi-service WDM networks, tailored at needs of specific network users and adaptable to services yet to emerge. A number of unique routing solutions are proposed, and an extensive analysis of dynamically re-configurable multi-service WDM networks impart the major contribution to the current efforts in standardisation and network operation, and give an inimitable motivation for further study and research.
Primarily targeted toward the network or MIS manager who wants to stay abreast of the latest networking technology, Enterprise Networking: Multilayer Switching and Applications offers up to date information relevant for the design of modern corporate networks and for the evaluation of new networking equipment. The book describes the architectures and standards of switching across the various protocol layers and will also address issues such as multicast quality of service, high-availability and network policies that are requirements of modern switched networks.
Many countries around the world are investing a great amount of resources in government IT initiatives. However, few of these projects achieve their stated goals and some of them are complete failures. Therefore, understanding e-government success has become very important and urgent in recent years. In order to develop relevant knowledge about this complex phenomenon, researchers and practitioners need to identify and assess what are the main conditions, variables, or factors that have an impact on e-government success. However, before being able to evaluate these impacts, it is necessary to define what e-government success is and what some e-government success measures are. This book presents a review of both e-government success measures and e-government success factors. It also provides empirical evidence from quantitative analysis and two in-depth case studies. Although based on sound theory and rigorous empirical analysis, the book not only significantly contributes to academic knowledge, but also includes some practical recommendations for government officials and public managers. Theoretically, the book proposes a way to quantitatively operationalize Fountain's enactment framework. Based on the institutional tradition, the technology enactment framework attempts to explain the effects of organizational forms and institutional arrangements on the information technology used by government agencies. According to Fountain (1995; 2001) the technology enactment framework pays attention to the relationships among information technology, organizations, embeddedness, and institutions. This framework is very well known in the e-government field, but is normally used for qualitative analysis and there is no previous proposal of how to use it with quantitative data. The book proposes variables to measure each of the different constructs in this framework and also tests the relationships hypothesized by Fountain's theory. Finally, using the advantages of the selected quantitative analysis technique (Partial Least Squares), the study also proposes some adjustments and extensions to the original framework in a theory building effort. Methodologically, the book reports on one of the first multi-method studies in the field of e-government in general and e-government success in particular. This study uses a nested research design, which combines statistical analysis with two in depth case studies. The study begins with a statistical analysis using organizational, institutional, and contextual factors as the independent variables. An overall score representing e-government success in terms of the functionality of state websites is the dependent variable. Second, based on the statistical results two cases are selected based on their relative fitness to the model (residuals) and their position in the general ranking of website functionality (which includes four different measures). In order to complement the results of the statistical analysis, case studies were developed for the two selected states (New York and Indiana), using semi-structured interviews and document analysis. In terms of the statistical analysis, the book constitutes one of the first applications of Partial Least Squares (PLS) to an e-government success study. PLS is a structural equations modeling (SEM) technique and, therefore, allows estimating the measurement model and the structural model simultaneously. The use of this sophisticated statistical strategy helped to test the relationships between e-government success and different factors influencing it, as well as some of the relationships between several of the factors, thus allowing exploring some indirect effects too.
Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area. This volume contains selected papers from the conference in the following focus areas: ad hoc networks / hybrid networks / WLAN; security, privacy and consumer protection; adaptive architectures and protocols; flexible QoS and QoS management; flexible service specification, validation, searching and querying; service composition and Web services; personal, terminal and node mobility; programmable and active networks.
This well-conceived annotated bibliography of 497 items covers all areas of hypermedia and hypertext through the end of 1989. Though not meant to be exhaustive, it does a very good job of identifying many important books, articles, proceedings and ERIC documents pertaining to hypertext/hypermedia and related issues. . . . This bibliography is the most thorough compilation of works in the field of hypertext/hypermedia and it deserves a place on the reference shelves of any large academic or public libraries. Any individual interested in finding information on this fast growing field will find this book extremely helpful. Choice This is the only comprehensive annotated bibliography on hypertext/hypermedia. Hypertext refers to units of information interconnected with links. Hypermedia involves the extension of this concept to include information units in the form of graphics, music, animation, video, or any type of media that can be digitized. Hypertext/hypermedia systems allow users to access and interact with information. Listing nearly 500 citations, the bibliography represents the work of over 350 authors. Extremely up-to-date, the book is comprehensive through the first half of 1989. Hypertext/hypermedia applications in such areas as education, automobile diagnostic and repair systems, job training, medical diagnostic systems, electronic publishing, and job training are some of the ideas covered in this bibliography. The bibliography contains items in the following formats: books, book chapters, journal articles, conference proceedings, ERIC documents, government publications, and hypertext documents. Dissertations, technical reports, and items in languages other than English are not included. The bibliography is arranged alphabetically by author. Primary access is provided by subject and author indexes. Each entry includes sufficient bibliographic information to locate the item in a library, acquire it through interlibrary loan, or purchase it. The book is suitable for all libraries.
The potential of software applications to solve an array of office
and administrative problems is increasing faster than the ability
of users to exploit it. We need to make systems easier to learn and
more comfortable to use. This book reports a major advance in the
effort to accomplish both goals.
Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security. Cloud technology has changed the way we approach technology. It’s also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you’ll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to:
As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.
This book is the first systematic exposition on the emerging domain of wireless power transfer in ad hoc communication networks. It selectively spans a coherent, large spectrum of fundamental aspects of wireless power transfer, such as mobility management in the network, combined wireless power and information transfer, energy flow among network devices, joint activities with wireless power transfer (routing, data gathering and solar energy harvesting), and safety provisioning through electromagnetic radiation control, as well as fundamental and novel circuits and technologies enabling the wide application of wireless powering. Comprising a total of 27 chapters, contributed by leading experts, the content is organized into six thematic sections: technologies, communication, mobility, energy flow, joint operations, and electromagnetic radiation awareness. It will be valuable for researchers, engineers, educators, and students, and it may also be used as a supplement to academic courses on algorithmic applications, wireless protocols, distributed computing, and networking.
Optical WDM networking technology is spearheading a bandwidth revolution in the networking infrastructure being developed for the next generation Internet. Rapid advances in optical components have enabled the transition from point-to-point WDM links to all-optical networking. Optical WDM Networks: Principles and Practice presents some of the most important challenges facing the optical networking community, along with some suggested solutions. Earlier textbooks in optical networking have a narrower perspective, and rapidly advancing research has created the need for fresh and current information on problems and issues in the field. The volume editors and contributing authors have endeavoured to capture a substantial subset of the key problems and known solutions to these problems. All of the chapters are original contributions from leading international researchers. The chapters address a wide variety of topics, including the state of the art in WDM technology, physical components that make up WDM fiber-optic networks, medium access protocols, wavelength routed networks, optical access networks, network management, and performance evaluation of wavelength routing networks. The chapters also survey critical points in past research and tackle more recent problems. Practitioners and network product engineers interested in current state-of-the-art information beyond textbook-type coverage, and graduate students commencing research in this area, will appreciate the concise - and pertinent - information presented herein.
This book addresses propagation phenomena in satellite, radar, broadcasting, short range , trans-horizon and several recent modes of communications in radio links. Also, it includes some topics on antennas , radio noises and improvement techniques. The book provides the necessary basic matters, as well as experimental results and calculation procedures for radio link design.
"Dynamic Provisioning for Community Services" outlines a dynamic
provisioning and maintenance mechanism in a running distributed
system, e.g. the grid, which can be used to maximize the
utilization of computing resources and user demands. The book
includes a complete and reliable maintenance system solution for
the large-scale distributed system and an interoperation mechanism
for the grid middleware deployed in the United States, Europe, and
China. The experiments and evaluations have all been practically
implemented for ChinaGrid, and the best practices established can
help readers to construct reliable distributed systems.
Scientific Workflow has seen massive growth in recent years as science becomes increasingly reliant on the analysis of massive data sets and the use of distributed resources. The workflow programming paradigm is seen as a means of managing the complexity in defining the analysis, executing the necessary computations on distributed resources, collecting information about the analysis results, and providing means to record and reproduce the scientific analysis. Workflows for e-Science presents an overview of the current state of the art in the field. It brings together research from many of leading computer scientists in the workflow area and provides real world examples from domain scientists actively involved in e-Science. The computer science topics addressed in the book provide a broad overview of active research focusing on the areas of workflow representations and process models, component and service-based workflows, standardization efforts, workflow frameworks and tools, and problem solving environments and portals. The topics covered represent a broad range of scientific workflow and will be of interest to a wide range of computer science researchers, domain scientists interested in applying workflow technologies in their work, and engineers wanting to develop workflow systems and tools. As such Workflows for e-Science is an invaluable resource for potential or existing users of workflow technologies and a benchmark for developers and researchers. Ian Taylor is Lecturer in Computer Science at Cardiff University, and coordinator of Triana activities at Cardiff. He is the author of "From P2P to Web Services and Grids," also published by Springer. Ewa Deelmanis a Research Assistant Professor at the USC Computer Science Department and a Research Team Leader at the Center for Grid Technologies at the USC Information Sciences Institute. Dennis Gannon is a professor of Computer Science in the School of Informatics at Indiana University. He is also Science Director for the Indiana Pervasive Technology Labs.. Dr Shields is a research associate at Cardiff and one of two lead developers for the Triana project.
This book reports on cutting-edge research carried out within the context of the EU-funded Dicode project, which aims at facilitating and augmenting collaboration and decision making in data-intensive and cognitively complex settings. Whenever appropriate, Dicode builds on prominent high-performance computing paradigms and large data processing technologies to meaningfully search, analyze, and aggregate data from diverse, extremely large and rapidly evolving sources. The Dicode approach and services are fully explained and particular emphasis is placed on deepening insights regarding the exploitation of big data, as well as on collaboration and issues relating to sense-making support. Building on current advances, the solution developed in the Dicode project brings together the reasoning capabilities of both the machine and humans. It can be viewed as an innovative "workbench" incorporating and orchestrating a set of interoperable services that reduce the data intensiveness and complexity overload at critical decision points to a manageable level, thus permitting stakeholders to be more productive and effective in their work practices.
A comprehensive and efficient way to prepare for the A+ exam and succeed as a computer technician The newly revised Fifth Edition of the CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 delivers essential and accessible exam prep material for the sought-after A+ certification. It offers full coverage of all of the A+ exam objectives covered on the latest Core 1 and Core 2 exams, ensuring you'll have the knowledge and skills you need to succeed on the test and in the real world. This book covers mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software troubleshooting, and operational procedures. Its comprehensive discussions of all exam competencies will prepare you for your first role as a computer technician and let you hit the ground running. The book also offers: Accessible and easy-to-follow organization perfect for quick review and reinforcement of key topics Practical examples and insights drawn from the real-world experience of actual computer technicians Access to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Ideal for anyone preparing for the Core 1 and Core 2 A+ exams, CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is also perfect for all aspiring and early-career computer technicians who seek to improve their performance in the field.
How do we design a self-organizing system? Is it possible to validate and control non-deterministic dynamics? What is the right balance between the emergent patterns that bring robustness, adaptability and scalability, and the traditional need for verification and validation of the outcomes? The last several decades have seen much progress from original ideas of "emergent functionality" and "design for emergence", to sophisticated mathematical formalisms of "guided self-organization". And yet the main challenge remains, attracting the best scientific and engineering expertise to this elusive problem. This book presents state-of-the-practice of successfully engineered self-organizing systems, and examines ways to balance design and self-organization in the context of applications. As demonstrated in this second edition of Advances in Applied Self-Organizing Systems, finding this balance helps to deal with practical challenges as diverse as navigation of microscopic robots within blood vessels, self-monitoring aerospace vehicles, collective and modular robotics adapted for autonomous reconnaissance and surveillance, self-managing grids and multiprocessor scheduling, data visualization and self-modifying digital and analog circuitry, intrusion detection in computer networks, reconstruction of hydro-physical fields, traffic management, immunocomputing and nature-inspired computation. Many algorithms proposed and discussed in this volume are biologically inspired, and the reader will also gain an insight into cellular automata, genetic algorithms, artificial immune systems, snake-like locomotion, ant foraging, birds flocking, neuromorphic circuits, amongst others. Demonstrating the practical relevance and applicability of self-organization, Advances in Applied Self-Organizing Systems will be an invaluable tool for advanced students and researchers in a wide range of fields.
Leyton's Process Grammar has been applied by scientists and engineers in many disciplines including medical diagnosis, geology, computer-aided design, meteorology, biological anatomy, neuroscience, chemical engineering, etc. This book demonstrates the following: The Process Grammar invents several entirely new concepts in biological morphology and manufacturing design, and shows that these concepts are fundamentally important. The Process Grammar has process-inference rules that give, to morphological transitions, powerful new "causal explanations." Remarkably, the book gives a profound "unification" of "biological morphology" and "vehicle design." The book invents over 30 new CAD operations that realize fundamentally important functions of a product. A crucial fact is that the Process Grammar is an example of the laws in Leyton's Generative Theory of Shape which give the ability to recover the "design intents "for which the shape features of a CAD model were created. The book demonstrates that the Process Grammar recovers important design intents in biological morphology and manufacturing design. In large-scale manufacturing systems, the recovery of design intents is important for solving the interoperability problem and product lifecycle management. This book is one of a series of books in Springer that elaborates Leyton's Generative Theory of Shape.
This book offers a comprehensible overview of Big Data Preprocessing, which includes a formal description of each problem. It also focuses on the most relevant proposed solutions. This book illustrates actual implementations of algorithms that helps the reader deal with these problems. This book stresses the gap that exists between big, raw data and the requirements of quality data that businesses are demanding. This is called Smart Data, and to achieve Smart Data the preprocessing is a key step, where the imperfections, integration tasks and other processes are carried out to eliminate superfluous information. The authors present the concept of Smart Data through data preprocessing in Big Data scenarios and connect it with the emerging paradigms of IoT and edge computing, where the end points generate Smart Data without completely relying on the cloud. Finally, this book provides some novel areas of study that are gathering a deeper attention on the Big Data preprocessing. Specifically, it considers the relation with Deep Learning (as of a technique that also relies in large volumes of data), the difficulty of finding the appropriate selection and concatenation of preprocessing techniques applied and some other open problems. Practitioners and data scientists who work in this field, and want to introduce themselves to preprocessing in large data volume scenarios will want to purchase this book. Researchers that work in this field, who want to know which algorithms are currently implemented to help their investigations, may also be interested in this book.
This book highlights the connections between two technologies: artificial intelligence (AI) and Internet of things (IoT). It presents the application of these two technologies to solve various societal problems related to healthcare, agriculture, green environment, renewable energies, smart cities, etc. Each chapter in this book presents novel solutions to these problems along with the challenges in the application of AI and IoT to solve them. It discusses the adverse attacks on machine Learning models and how to protect sensitive data over the IoT networks. It also includes the security issues in IoT and their possible solutions.
This book investigates how various scientific communities - e.g. legal scientists, political scientists, sociologists, mathematicians, and computer scientists - study law and public policies, which are portrayed here as complex systems. Today, research on law and public policies is rapidly developing at the international level, relying heavily on modeling that employs innovative methods for concrete implementation. Among the subject matter discussed, law as a network of evolving and interactive norms is now a prominent sphere of study. Similarly, public policies are now a topic in their own right, as policy can no longer be examined as a linear process; rather, its study should reflect the complexity of the networks of actors, norms and resources involved, as well as the uncertainty or weak predictability of their direct or indirect impacts. The book is divided into three maain parts: complexity faced by jurists, complexity in action and public policies, and complexity and networks. The main themes examined concern codification, governance, climate change, normative networks, health, water management, use-related conflicts, legal regime conflicts, and the use of indicators.
This book gathers the state-of-the-art for industrial application of scientific and practical research in the Cloud and IoT paradigms to benefit society. The book first aims to discuss and outline various aspects of tackling climate change. The authors then discuss how Cloud and IoT can help for digital health and learning from industrial aspects. The next part of book discusses technical improvements in the fields of security and privacy. The book also covers Smart Homes and IoT in agriculture. The book is targeted towards advancing undergraduate, graduate, and post graduate students, researchers, academicians, policymakers, various government officials, NGOs, and industry research professionals who are currently working in the field of science and technology either directly or indirectly to benefit common masses.
This book combines traditional graph theory with the matroid view of graphs in order to throw light on the mathematical approach to network analysis. The authors examine in detail two dual structures associated with a graph, namely circuits and cutsets. These are strongly dependent on one another and together constitute a third, hybrid, vertex-independent structure called a graphoid, whose study is here termed hybrid graph theory. This approach has particular relevance for network analysis. The first account of the subject in book form, the text includes many new results as well as the synthesizing and reworking of much research done over the past thirty years (historically, the study of hybrid aspects of graphs owes much to the foundational work of Japanese researchers). This work will be regarded as the definitive account of the subject, suitable for all working in theoretical network analysis: mathematicians, computer scientists or electrical engineers.
When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.
In this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption-fear. Fear of the unknown, fear of the intangible, fear of the investment needed and, yes, fear of losing your job to a machine. With his talent for distilling clarity from complexity, Edosa tackles this and many other challenges. -Tim Carmichael, Chief Data Officer, Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data, information and knowledge across organisations. Yet, rather than being stuck with endless polarising debates such as breaking down silos, it shifts focus back towards the ultimate "to what end." -Jacky Wright, Chief Digital Officer (CDO), Microsoft US If you care about AI transformation, empowering people or advancing organisational success in an increasingly digital world, then you should read this book. -Yomi Ibosiola, Chief Data and Analytics Officer, Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when-at the end of a critical investment in an artificial intelligence project that had been meant to save money-it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer's production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to "make data work" for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation, empower people, and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes, where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities. |
You may like...
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,527
Discovery Miles 65 270
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
Internet of Things (IoT) for Automated…
Yasser Ismail
Hardcover
Model-Driven Development and Operation…
Dana Petcu, Peter Matthews, …
Hardcover
R1,339
Discovery Miles 13 390
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|