![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > General
The book presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), which took place on November 28-29, 2018 in Manila, Philippines. The conference featured the following tracks: Industrial Engineering and Healthcare, Sustainable Infrastructure; Water Resources Planning and Management; Heat transfer and fluids; Electronics and Electrical Engineering; and Internet of Things. Papers stem from academia and industry throughout the world, showing a variety of perspectives. Presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), November 28-29, 2018 in Manila, Philippines Shows how engineering and technology serve to support a variety for industries from manufacturing to water resources Features papers from a variety of researchers and developers from around the world
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network. In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource (e.g., virtual switch, virtual routers, virtual LSRs, virtual optical path, virtual firewall, virtual SIP-based servers, virtual devices, virtual servers, virtual access points, and so on). We will show how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocol like TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.
The Emerald Handbook of ICT in Tourism and Hospitality examines the immense, widespread and ongoing changes that digital technologies are having on the tourism and hospitality industries globally. An international range of contributors present key research findings, in-depth case studies and discussion of the future implications stemming from technologies changes and developments across a number of core themes effecting these industries, including destination promotion, marketing contexts, service promotion and smart city involvement. Chapters explore new developments on a wide range of contemporary issues, including: * ICT, sustainable development and implications for the tourism industry * the role of mobile technology for tourism development * influencer marketing for tourism and hospitality * online tracking * factors influencing Generation Y tourism choices * cross country cases of ICT application in tourism and hospitality. The Emerald Handbook of ICT in Tourism and Hospitality is aimed primarily at global tourism academics and researchers, however graduate students of tourism and academics will also find this book to be of interest.
In recent years, wireless communication has become an integral part of daily life, allowing people across the world to communicate with each other easily, regardless of their geographical location. As these technologies develop, innovations are made in the ways in which they are constructed. Emerging trends in smart material usage in wireless technology requires further investigation for the optimization of next-generation communication technology. Innovative Smart Materials Used in Wireless Communication Technology focuses on the advancements of smart material usage in wireless communication technologies. It analyzes the design, usage, and construction of these smart materials for wireless applications. Covering topics such as millimeter wave antennas, semiconductor materials, and wearable applications, this premier reference source is an essential resource for material engineers and scientists, communications scientists, manufacturers, students and educators of higher education, librarians, researchers, and academicians.
Broad and up-to-date coverage of the principles and practice in the fast moving area of Distributed Systems. Distributed Systems provides students of computer science and engineering with the skills they will need to design and maintain software for distributed applications. It will also be invaluable to software engineers and systems designers wishing to understand new and future developments in the field. From mobile phones to the Internet, our lives depend increasingly on distributed systems linking computers and other devices together in a seamless and transparent way. The fifth edition of this best-selling text continues to provide a comprehensive source of material on the principles and practice of distributed computer systems and the exciting new developments based on them, using a wealth of modern case studies to illustrate their design and development. The depth of coverage will enable readers to evaluate existing distributed systems and design new ones.
Up to date with the fourth edition of PMI's Program Management Standard, PgMP (R) Practice Test Questions: 1000+ Practice Exam Questions for the PgMP (R) Examination contains more than 1,000 practice questions to help readers hone their knowledge and test their skills. It covers all five of the program management domains: Strategic Program Management, Program Management Life Cycle, Benefits Management, Stakeholder Management, and Governance. It also examines all of the sub domains of the lifecycle domain. With an easy-to-use format, this is an ideal resource for those preparing to take the PgMP (R) exam.
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required
The emergent ?eld of Intelligent Distributed Computing brings together two wellestablishedareasofComputerScience:DistributedComputingandC- putational Intelligence. Theoretical foundations and practical applications of Intelligent Distributed Computing set the premises for the new generation of intelligent distributed information systems. Intelligent Distributed Computing - IDC Symposium Series was started as an initiative of research groups from: (i) Systems Research Institute, P- ish Academy of Sciences in Warsaw, Poland and (ii) Software Engineering Department of the University of Craiova, Craiova, Romania. IDC aims at bringing together researchers and practitioners involved in all aspects of - telligent Distributed Computing. IDC is interested in works that are relevant for both Distributed Computing and Computational Intelligence, with sci- ti?c contribution in at least one of these two areas. IDC'2010 was the fourth event in the series and was hosted by IEEE Morocco Section in Tangier, - rocco duringSeptember16-18,2010. IDC'2010wascollocatedwith:(i)NATO summer schoolon"SoftwareAgents, Agent Systems andtheir Applications"; nd (ii) 2 International Workshop on Multi-Agent Systems Technology and - mantics, MASTS'2010. The material published in this book is divided into three main parts: (i) 1 invited contribution; (ii) 28 contributions of IDC'2010 participants; and (iii) 4 contributions of MASTS'2010 participants. The response to IDC'2010 call for paper was generous. We received 53 submissions from 20 countries (we counted the country of each coauthor for each submitted paper). Each submission was carefully reviewed by at least 3 members of the IDC'2010 Program Committee.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
The book discusses active devices and circuits for microwave communications. It begins with the basics of device physics and then explores the design of microwave communication systems including analysis and the implementation of different circuits. In addition to classic topics in microwave active devices, such as p-i-n diodes, Schottky diodes, step recovery diodes, BJT, HBT, MESFET, HFET, and various microwave circuits like switch, phase shifter, attenuator, detector, amplifier, multiplier and mixer, the book also covers modern areas such as Class-F power amplifiers, direct frequency modulators, linearizers, and equalizers. Most of the examples are based on practical devices available in commercial markets and the circuits presented are operational. The book uses analytical methods to derive values of circuit components without the need for any circuit design tools, in order to explain the theory of the circuits. All the given analytical expressions are also cross verified using commercially available microwave circuit design tools, and each chapter includes relevant diagrams and solved problems. It is intended for scholars in the field of electronics and communication engineering.
An indispensable guide to the newest version of the Google Certified Professional Cloud Architect certification The newly revised Second Edition of the Google Cloud Certified Professional Cloud Architect Study Guide delivers a proven and effective roadmap to success on the latest Professional Cloud Architect accreditation exam from Google. You'll learn the skills you need to excel on the test and in the field, with coverage of every exam objective and competency, including focus areas of the latest exam such as Kubernetes, Anthos, and multi-cloud architectures. The book explores the design, analysis, development, operations, and migration components of the job, with intuitively organized lessons that align with the real-world job responsibilities of a Google Cloud professional and with the PCA exam topics. Architects need more than the ability to recall facts about cloud services, they need to be able to reason about design decisions. This study guide is unique in how it helps you learn to think like an architect: understand requirements, assess constraints, choose appropriate architecture patterns, and consider the operational characteristics of the systems you design. Review questions and practice exams use scenario-based questions like those on the certification exam to build the test taking skills you will need. In addition to comprehensive material on compute resources, storage systems, networks, security, legal and regulatory compliance, reliability design, technical and business processes, and more, you'll get: The chance to begin or advance your career as an in-demand Google Cloud IT professional Invaluable opportunities to develop and practice the skills you'll need as a Google Cloud Architect Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The ideal resource for anyone preparing for the Professional Cloud Architect certification from Google, Google Cloud Certified Professional Cloud Architect Study Guide, 2nd Edition is also a must-read resource for aspiring and practicing cloud professionals seeking to expand or improve their technical skillset and improve their effectiveness in the field.
With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements. This book discusses: The controller-processor relationship and what you should pay attention to; How to mitigate security risks in the Cloud to comply with Article 32 of the EU GDPR (General Data Protection Regulation); How to comply with Chapter V of the GDPR when transferring data to third countries; and The implications of the NIS Directive (Directive on security of network and information systems) for Cloud providers. One of the most dramatic recent developments in computing has been the rapid adoption of Cloud applications. According to the 2018 Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form, compared with only 24% in 2014. And there are no signs that this is slowing down. The GDPR was enforced on 25 May 2018, superseding the 1995 Data Protection Directive and all local implementations. Bringing data protection into the 21st century, the Regulation expands the rights of individuals, but also introduces new, stricter requirements for organisations. This pocket guide discusses the GDPR requirements relating to Cloud sourcing and the risks involved. Buy today and learn how to meet your data protection obligations when using Cloud services.
COOP 2010 is the 9th edition of the International Conference on Designing Cooperative Systems, being the second European conference in the field of Computer Supported Cooperative Work after ECSCW. The conference brings together researchers who contribute to the analysis and design of cooperative systems and their integration in organizational community, public and other settings, and their implications for policy and decision making. Cooperative systems design requires a deep understanding of collective activities, involving both artifacts and social practices. Contributions are solicited from a wide range of domains contributing to the fields of cooperative systems design and evaluation: CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agents, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics.
An expert guide for IT administrators needing to create and manage a public cloud and virtual network using Microsoft Azure With Microsoft Azure challenging Amazon Web Services (AWS) for market share, there has been no better time for IT professionals to broaden and expand their knowledge of Microsoft's flagship virtualization and cloud computing service. Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions helps readers develop the skills required to understand the capabilities of Microsoft Azure for Infrastructure Services and implement a public cloud to achieve full virtualization of data, both on and off premise. Microsoft Azure provides granular control in choosing core infrastructure components, enabling IT administrators to deploy new Windows Server and Linux virtual machines, adjust usage as requirements change, and scale to meet the infrastructure needs of their entire organization. This accurate, authoritative book covers topics including IaaS cost and options, customizing VM storage, enabling external connectivity to Azure virtual machines, extending Azure Active Directory, replicating and backing up to Azure, disaster recovery, and much more. New users and experienced professionals alike will: Get expert guidance on understanding, evaluating, deploying, and maintaining Microsoft Azure environments from Microsoft MVP and technical specialist John Savill Develop the skills to set up cloud-based virtual machines, deploy web servers, configure hosted data stores, and use other key Azure technologies Understand how to design and implement serverless and hybrid solutions Learn to use enterprise security guidelines for Azure deployment Offering the most up to date information and practical advice, Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions is an essential resource for IT administrators, consultants and engineers responsible for learning, designing, implementing, managing, and maintaining Microsoft virtualization and cloud technologies.
This book provides the foundation and understanding necessary for proper design of databases for today's distributed and multi-database architectures. Introductory chapters help novices understand essential topics such as SQL, relational databases, transaction processing, and deadlock detection, while subsequent sections dealing with homogeneous, distributed databases, heterogeneous multi-databases, and federated databases enable readers to understand the complexities of distributed database design. Packed with over 200 illustrations, 50 equations, and two full chapters of examples.
This book records the author's years of experience in the software industry. In his own practices, the author has found that the distributed work pattern has become increasingly popular in more and more work environments, either between vendors and customers or between different teams inside a company. This means that all practitioners in the software industry need to adapt to this new way of communication and collaboration and get skilled enough to meet the greater challenges in integrating the distributed work pattern with agile software delivery. By centering on the difficulties in communication and collaboration between distributed teams, this book digs into the reasons why so many remote delivery projects end up anticlimactic and provides solutions for readers' reference. It also cites successful cases in promoting agile development in distributed teams, which has been a vexing problem for many software development companies. In addition, readers can find suggestions and measures for building self-managing teams in this book. Remote Delivery: A Guide to Software Delivery through Collaboration between Distributed Teams is a very practical guide for software delivery teams with their members distributed in different places and companies engaged in software customization. Developers, QAs, product managers, and project leaders can also be inspired by this book.
This book provides a range of application areas of data and knowledge management and their solutions for the fields related to the convergence of information and communication technology (ICT), healthcare, and telecommunication services. The authors present approaches and case studies in future technological trends and challenges in the aforementioned fields. The book acts as a scholarly forum for researchers both in academia and industry.
Secure your CSSP certification CCSP is the world's leading Cloud Security certification. It covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures. If you're a cloud security professional seeking your CSSP certification, this book is a perfect way to prepare for the exam. Covering in detail all six domains, the expert advice in this book gives you key information you'll need to pass the exam. In addition to the information covered on the exam, you'll get tips on setting up a study plan, tips for exam day, and access to an online test bank of questions. Key information for all six exam domains Test -taking and exam day tips and tricks Free online practice questions and flashcards Coverage of the core concepts From getting familiar with the core concepts to establishing a study plan, this book is all you need to hang your hat on that certification!
Intelligent Image and Video Compression: Communicating Pictures, Second Edition explains the requirements, analysis, design and application of a modern video coding system. It draws on the authors' extensive academic and professional experience in this field to deliver a text that is algorithmically rigorous yet accessible, relevant to modern standards and practical. It builds on a thorough grounding in mathematical foundations and visual perception to demonstrate how modern image and video compression methods can be designed to meet the rate-quality performance levels demanded by today's applications and users, in the context of prevailing network constraints. "David Bull and Fan Zhang have written a timely and accessible book on the topic of image and video compression. Compression of visual signals is one of the great technological achievements of modern times, and has made possible the great successes of streaming and social media and digital cinema. Their book, Intelligent Image and Video Compression covers all the salient topics ranging over visual perception, information theory, bandpass transform theory, motion estimation and prediction, lossy and lossless compression, and of course the compression standards from MPEG (ranging from H.261 through the most modern H.266, or VVC) and the open standards VP9 and AV-1. The book is replete with clear explanations and figures, including color where appropriate, making it quite accessible and valuable to the advanced student as well as the expert practitioner. The book offers an excellent glossary and as a bonus, a set of tutorial problems. Highly recommended!" --Al Bovik
Comprehensive and timely, Cloud Computing: Concepts and Technologies offers a thorough and detailed description of cloud computing concepts, architectures, and technologies, along with guidance on the best ways to understand and implement them. It covers the multi-core architectures, distributed and parallel computing models, virtualization, cloud developments, workload and Service-Level-Agreements (SLA) in cloud, workload management. Further, resource management issues in cloud with regard to resource provisioning, resource allocation, resource mapping and resource adaptation, ethical, non-ethical and security issues in cloud are followed by discussion of open challenges and future directions. This book gives students a comprehensive overview of the latest technologies and guidance on cloud computing, and is ideal for those studying the subject in specific modules or advanced courses. It is designed in twelve chapters followed by laboratory setups and experiments. Each chapter has multiple choice questions with answers, as well as review questions and critical thinking questions. The chapters are practically-focused, meaning that the information will also be relevant and useful for professionals wanting an overview of the topic.
Today's organizations find themselves in a race to adopt new technologies in order to keep up with their competition. However, two questions must be answered: Are these organizations ready for new technological advancements, and are these new technologies appropriate for every organization? Technological Challenges and Management: Matching Human and Business Needs focuses on the new advances and challenges that today's organizations face in the areas of human resources and business, resulting from continuous and highly complex changes in technological resources. Organizations need to implement a more proactive and flexible management, matching their human and business needs. Due to this reality, it is important to study and understand varied contributions made by researchers, academics, and practitioners in this field of study worldwide. With the focus of this reality, this book exchanges experiences and perspectives about the state of technological challenges and management research, and future directions for this field of study. It also takes into account the deep implications that these challenges have in the organization of human resources. The authors support academics and researchers and those operating in the management field in dealing with different challenges that organizations face today. This is especially true concerning the relationship between technological changes, human resources management, and business. They propose the sharing of knowledge, through debate and information exchange, about technological challenges and management, matching the critical items of human and business needs. The book is divided into seven chapters that span from evaluating new technologies to finding the perfect fit.
The proven Study Guide that prepares you for this new Google Cloud exam The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Professional Data Engineer certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Google Cloud Certified Professional Data Engineer Study Guide is your ace in the hole for deploying and managing analytics and machine learning applications. Build and operationalize storage systems, pipelines, and compute infrastructure Understand machine learning models and learn how to select pre-built models Monitor and troubleshoot machine learning models Design analytics and machine learning applications that are secure, scalable, and highly available. This exam guide is designed to help you develop an in depth understanding of data engineering and machine learning on Google Cloud Platform.
Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations. The book promotes the concept of the Tactile Internet for remote closed-loop human-machine interaction and describes the main challenges and key technologies. Current standardization activities in the field for IEEE and IETF are also described, making this book an ideal resource for researchers, graduate students, and industry R&D engineers in communications engineering, electronic engineering, and computer engineering.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements. |
![]() ![]() You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,490
Discovery Miles 14 900
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,996
Discovery Miles 29 960
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,908
Discovery Miles 59 080
|