![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
When viewed through a political lens, the act of defining terms in natural language arguably transforms knowledge into values. This unique volume explores how corporate, military, academic, and professional values shaped efforts to define computer terminology and establish an information engineering profession as a precursor to what would become computer science. As the Cold War heated up, U.S. federal agencies increasingly funded university researchers and labs to develop technologies, like the computer, that would ensure that the U.S. maintained economic prosperity and military dominance over the Soviet Union. At the same time, private corporations saw opportunities for partnering with university labs and military agencies to generate profits as they strengthened their business positions in civilian sectors. They needed a common vocabulary and principles of streamlined communication to underpin the technology development that would ensure national prosperity and military dominance. investigates how language standardization contributed to the professionalization of computer science as separate from mathematics, electrical engineering, and physics examines traditions of language standardization in earlier eras of rapid technology development around electricity and radio highlights the importance of the analogy of "the computer is like a human" to early explanations of computer design and logic traces design and development of electronic computers within political and economic contexts foregrounds the importance of human relationships in decisions about computer design This in-depth humanistic study argues for the importance of natural language in shaping what people come to think of as possible and impossible relationships between computers and humans. The work is a key reference in the history of technology and serves as a source textbook on the human-level history of computing. In addition, it addresses those with interests in sociolinguistic questions around technology studies, as well as technology development at the nexus of politics, business, and human relations.
The rise of social software and the proliferation of social networking tools represents a relatively recent cultural phenomenon. The attitudes and behaviors of virtual communities and social groups goes beyond the distributed technological platforms being deployed and requires new conceptualizations and understandings of communities and their corresponding ontologies. ""The Handbook of Research on Social Software and Developing Community Ontologies"" examines the impact of new technologies and explores how social software and developing community ontologies are challenging the way we operate in a connected, distributed, and increasingly performative space. Through authoritative contributions by a vast group of international experts in this subject area, this book provides important new insights into where new social technologies and emergent behaviors are leading us.
The Definitive Guide to Interwoven TeamSite is the first comprehensive book on this enterprise-level content management system, guiding the reader through the product Architecture, key features, and a detailed implementation of the product by way of a case-study involving a hypothetical financial services firm. Along the way, the authors share key development and deployment principles gained throughout their several years of working in enterprise CMS environments. Divided into five parts, the material is presented in much the same way one might expect when considering a large-scale CMS project: Introduction, Inception, Elaboration, Construction, and Transition. Each part introduces the concepts and TeamSite features readers will need to understand in order to carry out that aspect of the project. Complete with a working implementation and numerous visual guides, the authors painstakingly layout the project process. Finally an Epilogue which discusses future product releases.
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.
To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently. The book addresses a range of technical issues in cooperative resource allocation and information sharing for the future 6G heterogenous networks, from the terrestrial ultra-dense networks and space-based networks to the integrated satellite-terrestrial networks, as well as introducing the effects of cooperative behavior among mobile users on increasing capacity, trustworthiness and privacy. For the cooperative transmission in heterogeneous networks, the authors commence with the traffic offloading problems in terrestrial ultra-dense networks, and the cognitive and cooperative mechanisms in heterogeneous space-based networks, the stability analysis of which is also provided. Moreover, for the cooperative transmission in integrated satellite-terrestrial networks, the authors present a pair of dynamic and adaptive resource allocation strategies for traffic offloading, cooperative beamforming and traffic prediction based cooperative transmission. Later, the authors discuss the cooperative computation and caching resource allocation in heterogeneous networks, with the highlight of providing our current studies on the game theory, auction theory and deep reinforcement learning based approaches. Meanwhile, the authors introduce the cooperative resource and information sharing among users, in which capacity oriented-, trustworthiness oriented-, and privacy oriented cooperative mechanisms are investigated. Finally, the conclusion is drawn.
This book investigates the impact of information and communication technologies (ICTs) on development and well-being (beyond economic benefits) and highlights some emerging issues relating to the realities, constraints and digital divides with particular reference to India. It collects a series of novel contributions, studying the Indian experience in an international cross-country perspective. The book also discusses economic, social, and behavioural aspects of well-being as well as access to ICTs across regions, states and individuals to account for the digital divide. The book establishes an aggregate relationship between ICT exposure and well-being at the country level and addresses a number of fundamental issues, such as whether ICT raises the level of transparency and governance. Based on case studies and anecdotal evidence, it then further assesses the effective implementation of service delivery through ICT innovations. The book is divided into four parts: The introductory part surveys the literature and presents background information on the Indian case; introduces the main themes on the relationships between ICT, socio-economic development and digital divides; and provides a summary and roadmap to the chapters of the book. Part II focuses on the impact of ICT on economic performance, including economic growth, productivity and trade. Part III examines the extent of the digital divides in India, including international, regional as well as inter-personal inequality. Finally, Part IV investigates the impact of ICT on governance, users' well-being and social outcomes. Combining insights from analyses of a variety of socio-economic dimensions related to digitalisation, this book is relevant for a wide range of scholars and researchers across disciplines, as well as practitioners and policy-makers. While the book has a main focus on India, various contributions take an international cross-country comparative perspective, and the results have general relevance for digitalisation and development. On the whole, the main message of this book is that the impact of ICTs is contingent upon other assets, capabilities and institutional conditions. National policies should, therefore, not only promote digitalization as such but also ensure its co-evolution and complementarity with a variety of other country-specific factors. Chapter 'Digitalisation and Development: Issues for India and Beyond' of this book is available open access under a CC BY 4.0 license at link.springer.com
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
Today's organizations find themselves in a race to adopt new technologies in order to keep up with their competition. However, two questions must be answered: Are these organizations ready for new technological advancements, and are these new technologies appropriate for every organization? Technological Challenges and Management: Matching Human and Business Needs focuses on the new advances and challenges that today's organizations face in the areas of human resources and business, resulting from continuous and highly complex changes in technological resources. Organizations need to implement a more proactive and flexible management, matching their human and business needs. Due to this reality, it is important to study and understand varied contributions made by researchers, academics, and practitioners in this field of study worldwide. With the focus of this reality, this book exchanges experiences and perspectives about the state of technological challenges and management research, and future directions for this field of study. It also takes into account the deep implications that these challenges have in the organization of human resources. The authors support academics and researchers and those operating in the management field in dealing with different challenges that organizations face today. This is especially true concerning the relationship between technological changes, human resources management, and business. They propose the sharing of knowledge, through debate and information exchange, about technological challenges and management, matching the critical items of human and business needs. The book is divided into seven chapters that span from evaluating new technologies to finding the perfect fit.
Edge computing is quickly becoming an important technology throughout a number of fields as businesses and industries alike embrace the benefits it can have in their companies. The streamlining of data is crucial for the development and evolution of businesses in order to keep up with competition and improve functions overall. In order to appropriately utilize edge computing to its full potential, further study is required to examine the potential pitfalls and opportunities of this innovative technology. The Research Anthology on Edge Computing Protocols, Applications, and Integration establishes critical research on the current uses, innovations, and challenges of edge computing across disciplines. The text highlights the history of edge computing and how it has been adapted over time to improve industries. Covering a range of topics such as bandwidth, data centers, and security, this major reference work is ideal for industry professionals, computer scientists, engineers, practitioners, researchers, academicians, scholars, instructors, and students.
Eckert's HANDS-ON MICROSOFT (R) WINDOWS (R) SERVER 2019 equips you with a solid foundation in basic server administration -- no prior experience required. It empowers you with the knowledge to manage servers on small to large networks and maximize Windows (R) Server 2019 administration. Using a logical topic flow and step-by-step exercises, it delivers thorough coverage of core Windows (R) Server 2019 features. You will learn how to deploy Windows (R) Server 2019 in a variety of different environments -- including those that rely on virtualization and containers -- and how to configure and manage server storage, troubleshoot performance issues and work with common Windows (R) Server technologies and network services, such as Active Directory, DNS, DHCP, IPAM, file sharing, printing and remote access. Numerous hands-on projects and MindTap activities enable you to put what you learn into real-world practice.
Deep Reinforcement Learning for Wireless Communications and Networking Comprehensive guide to Deep Reinforcement Learning (DRL) as applied to wireless communication systems Deep Reinforcement Learning for Wireless Communications and Networking presents an overview of the development of DRL while providing fundamental knowledge about theories, formulation, design, learning models, algorithms and implementation of DRL together with a particular case study to practice. The book also covers diverse applications of DRL to address various problems in wireless networks, such as caching, offloading, resource sharing, and security. The authors discuss open issues by introducing some advanced DRL approaches to address emerging issues in wireless communications and networking. Covering new advanced models of DRL, e.g., deep dueling architecture and generative adversarial networks, as well as emerging problems considered in wireless networks, e.g., ambient backscatter communication, intelligent reflecting surfaces and edge intelligence, this is the first comprehensive book studying applications of DRL for wireless networks that presents the state-of-the-art research in architecture, protocol, and application design. Deep Reinforcement Learning for Wireless Communications and Networking covers specific topics such as: Deep reinforcement learning models, covering deep learning, deep reinforcement learning, and models of deep reinforcement learning Physical layer applications covering signal detection, decoding, and beamforming, power and rate control, and physical-layer security Medium access control (MAC) layer applications, covering resource allocation, channel access, and user/cell association Network layer applications, covering traffic routing, network classification, and network slicing With comprehensive coverage of an exciting and noteworthy new technology, Deep Reinforcement Learning for Wireless Communications and Networking is an essential learning resource for researchers and communications engineers, along with developers and entrepreneurs in autonomous systems, who wish to harness this technology in practical applications.
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity-relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components. The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don't have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.
Design Science Research is a powerful paradigm enabling researchers to make important contributions to society and industry. Simply stated, the goal of DSR is to generate knowledge on how to find innovative solutions to important problems in the form of models, methods, constructs and instantiations. Over the past 20 years, the design science research (DSR) paradigm has developed into an established paradigm in Information Systems Research and it is of strong uptake in many other disciplines, including Management Science and Computer Science. This book provides a collection of twelve DSR cases, presented by experienced researchers in the field. It offers readers access to real-world DSR studies, together with the authors' reflections on their research processes. These cases will support researchers who want to engage in DSR, and represent a valuable addition to existing introductions to DSR methods and processes. Readers will learn from the hands-on experiences of respected experts who have conducted extensive DSR in a range of application contexts.
The book consists of high-quality papers presented at the International Conference on Computational Science and Applications (ICCSA 2019), held at Maharashtra Institute of Technology World Peace University, Pune, India, from 7 to 9 August 2019. It covers the latest innovations and developments in information and communication technology, discussing topics such as soft computing and intelligent systems, web of sensor networks, drone operating systems, web of sensor networks, wearable smart sensors, automated guided vehicles and many more.
After reading this book, I now have a clear understanding of how Nagios works, how to implement it across all types of networked equipment, and even how to shut it off during my week of on-call. I give this book a 10/10. -- Joe Topjian, Adminspotting.net "Pro Nagios 2.0" explains how to install and administer Nagios, the web-based enterprise management tool that helps monitor Unix, Windows, network devices, infrastructure equipment, and applications. Youll learn how to architect Nagios installations, deploy agents and plug-ins, and monitor a variety of assets, which include applications across a variety of platforms and operating systems. Nagios has the power to alert you to current and future incidents that could impact the availability, performance, and security of monitored assets. The books real-world configurations and supporting materials will enable you to deploy Nagios and integrate other tools (like MRTG and Snort) on a helpful step-by-step basis. Integrating Nagios with a variety of other tools can add more functionality to its internal monitoring and alerting capabilities. The book covers additional topics like security, redundancy and failover, and plug-in development. And it shows you how to create your own Nagios plug-ins, to monitor devices for which Nagios may not provide plug-ins.
In recent years, scientists have become more focused on the research, development, and integration of Heterogeneous Wireless Networks (HWN) platforms in order to both converge the existing telecom technology and to deliver multimedia services of high intrinsic and perceived Quality of Service (QoS) to users. The Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms identifies key issues facing next generation networks and highlights promising technologies. With over 20 research contributions from 47 international experts, this comprehensive collection explores the technical characteristics of the shared core network and multiple access networks, and the associated modeling, security, and performance issues essential to quality service delivery of integrated data, video, and voice. Enhanced with far-reaching considerations of the societal and commercial implications in such domains as e-government and e-commerce, this essential addition to library reference collections will also benefit academics, technology specialists, managers, and policy makers in a broad range of settings.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.
This book presents both state-of-the-art research developments and practical guidance on approaches, technologies and frameworks for the emerging cloud paradigm. Topics and features: presents the state of the art in cloud technologies, infrastructures, and service delivery and deployment models; discusses relevant theoretical frameworks, practical approaches and suggested methodologies; offers guidance and best practices for the development of cloud-based services and infrastructures, and examines management aspects of cloud computing; reviews consumer perspectives on mobile cloud computing and cloud-based enterprise resource planning; explores software performance testing, open-source cloudware support, and assessment methodologies for modernization, migration and pre-migration; describes emerging new methodologies relevant to the cloud paradigm, and provides suggestions for future developments and research directions.
In this concise yet comprehensive Open Access textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. Concepts are introduced in a cross-disciplinary way. Leveraging hybrid (continuous/discrete) systems as a unifying framework and Acumen as a modeling environment, the book bridges the conceptual gap in modeling skills needed for physical systems on the one hand and computational systems on the other. In doing so, the book gives the reader the modeling and design skills they need to build smart, IT-enabled products. Starting with a look at various examples and characteristics of Cyber-Physical Systems, the book progresses to explain how the area brings together several previously distinct ones such as Embedded Systems, Control Theory, and Mechatronics. Featuring a simulation-based project that focuses on a robotics problem (how to design a robot that can play ping-pong) as a useful example of a CPS domain, Cyber-Physical Systems: A Model-Based Approach demonstrates the intimate coupling between cyber and physical components, and how designing robots reveals several non-trivial control problems, significant embedded and real-time computation requirements, and a need to consider issues of communication and preconceptions.
This book provides a range of application areas of data and knowledge management and their solutions for the fields related to the convergence of information and communication technology (ICT), healthcare, and telecommunication services. The authors present approaches and case studies in future technological trends and challenges in the aforementioned fields. The book acts as a scholarly forum for researchers both in academia and industry.
With this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing initiatives. Big Data Analytics: A Practical Guide for Managers not only supplies descriptions of common tools, but also surveys the various products and vendors that supply the big data market. Comparing and contrasting the different types of analysis commonly conducted with big data, this accessible reference presents clear-cut explanations of the general workings of big data tools. Instead of spending time on HOW to install specific packages, it focuses on the reasons WHY readers would install a given package. The book provides authoritative guidance on a range of tools, including open source and proprietary systems. It details the strengths and weaknesses of incorporating big data analysis into decision-making and explains how to leverage the strengths while mitigating the weaknesses. Describes the benefits of distributed computing in simple terms Includes substantial vendor/tool material, especially for open source decisions Covers prominent software packages, including Hadoop and Oracle Endeca Examines GIS and machine learning applications Considers privacy and surveillance issues The book further explores basic statistical concepts that, when misapplied, can be the source of errors. Time and again, big data is treated as an oracle that discovers results nobody would have imagined. While big data can serve this valuable function, all too often these results are incorrect, yet are still reported unquestioningly. The probability of having erroneous results increases as a larger number of variables are compared unless preventative measures are taken. The approach taken by the authors is to explain these concepts so managers can ask better questions of their analysts and vendors as to the appropriateness of the methods used to arrive at a conclusion. Because the world of science and medicine has been grappling with similar issues in the publication of studies, the authors draw on their efforts and apply them to big data.
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data analytics for smart city enhancement and improved decision making Includes case studies of intelligent cities, smart homes, buildings, transports, healthcare systems, and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types, including enterprise-scale integration, security, management, and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework, including cloud, big data, Internet of Things, and mobile technologies.
This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Features: Covers technologies supporting advanced wireless communication system, sensor networks and the conceptual development of the subject. Discusses advanced data gathering and sharing/ distributed sensing techniques with its business applicability. Includes numerous worked-out mathematical equations/formulas, and essential principles including figures, illustrations, algorithms, and flow charts are included in the book. Provides pervasive background knowledge including both wireless communications and wireless sensor networks Covers wireless networks as well as sensor network models in detailed. This is aimed at graduate students, researchers and academicians working in the field of computer science, wireless communication technology, and advanced wireless sensor networks. |
You may like...
Security in Wireless LANs and MANs
Thomas Hardjono, Lakshminath R. Dondeti
Hardcover
R2,511
Discovery Miles 25 110
Big Data Processing Using Spark in Cloud
Mamta Mittal, Valentina E. Balas, …
Hardcover
R2,677
Discovery Miles 26 770
Impact of Digital Transformation on…
Sam Goundar, S. Bharath Bhushan, …
Hardcover
R5,936
Discovery Miles 59 360
|