Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
Multimedia data streams will form a major part of the new generation of applications in high-speed networks. Continuous media streams, however, require transmission with guaranteed performance. In addition, many multimedia applications will require peer-to-multipeer communication. Guaranteed performance can only be provided with resource reservation in the network, and efficient multipeer communication must be based on multicast support in the lower layers of the network. Architecture and Protocols for High-Speed Networks focuses on techniques for building the networks that will meet the needs of these multimedia applications. In particular two areas of current research interest in such communication systems are covered in depth. These are the protocol related aspects, such as switched networks, ATM, MAC layer, network and transport layer; and the services and applications. Architecture and Protocols for High-Speed Networks contains contributions from leading world experts, giving the most up-to-date research available. It is an essential reference for all professionals, engineers and researchers working in the area of high-speed networks.
As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network.
This edited monograph brings together research papers covering the state of the art in cloud computing for logistics. The book includes general business object models for intralogistics as well as user-friendly methods for logistics business process design. It also presents a general template for logistics applications from the cloud. The target audience primarily comprises researchers and experts in the field, but the book will also be beneficial for graduate students.
New Services such as for Internet data and multimedia applications, have caused a fast growing demand for broadband communications. The fundamental technologies for the integration of these services have been developed in the last decade: optical communications, photonic switching, high speed local area networks, Asynchronous Transfer Mode (ATM), ISDN and B-ISDN, Internet packet networks and mobile communications. The development was possible through the dynamic progress in communication and computer technologies and through worldwide standardization activities within ITU-T, the ATM Forum, the IETF, IEEE, ANSI, ETSI and other bodies. These developments have been supported by research and field trial programmes. Past developments, such as about LAN, Internet or ISDN networking technologies, have shown that it needs a time span of 10 years for a new technology from its research stage to its full application. Broadband Communications is just at its onset for full deployment. It will have a dramatic effect not only on the networking situation but on the whole development of information technology throughout our social and economic life, which is expressed by the conference theme, The Future of Telecommunications." The Broadband Communications conference series of IFIP WG 6. 2 addresses the fundamental technical and theoretical problems related with these technologies. BC '98 is the fourth meeting in a series on conferences being held in Stuttgart, Germany. The previous confernces were held in Estoril, Portugal, in 1992, in Paris, France, in 1994, and in Montreal, Canada, in 1996.
This book offers a straight-forward guide to the fundamental work of governing bodies and the people who serve on them. The aim is of the book is to help every member serving on a governing body understand and improve their contribution to the entity and governing body they serve. The book is rooted in research, including five years' work by the author as a Research Fellow of Nuffield College, Oxford.
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
Marxist discourse around automation has recently become waylaid with breathless techno-pessimist dystopias and fanciful imaginations of automated luxury communism. This collection of essays by both established veterans of the field and new voices is a refreshingly sober materialist reflection on recent technological developments within capitalist production. It covers a broad range of digital aspects now proliferating across our work and lives, including chapters on the digitalisation of agriculture, robotics in the factory and the labour process on crowdworking platforms. It looks to how 20th century Marxist predictions of the 'workerless factory' are, or are not, coming true, and how 'Platform Capitalism' should be understood and critiqued. Through rich empirical, theoretical and historical material, this book is necessary reading for those wanting a clear overview of our digital world.
Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: * sensor node design; * embedded software design; * routing algorithms; * sink node positioning; * co-existence with other wireless systems; * data fusion; * security; * indoor location tracking; * integrating with radio-frequency identification; and * Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.
Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market
Unique selling point: Combines theory with practice and applications for advanced intelligent healthcare informatics Core audience: Researchers and academics in healthcare informatics and machine learning Place in the market: Reference work
HW/SW Co-Design for Heterogeneous Multi-Core Platforms describes the results and outcome of the FP6 project which focuses on the development of an integrated tool chain targeting a heterogeneous multi core platform comprising of a general purpose processor (ARM or powerPC), a DSP (the diopsis) and an FPGA. The tool chain takes existing source code and proposes transformations and mappings such that legacy code can easily be ported to a modern, multi-core platform. Downloadable software will be provided for simulation purposes.
FinOps brings financial accountability to the variable spend model of cloud. As enterprises move aggressively to cloud, ownership of technology and financial decision-making has shifted to the edges of the organization away from procurement to engineering, architecture, and product teams. FinOps, having grown from a fringe practice to the de facto discipline managing cloud spend, is now practiced by the majority of global enterprises. This second edition provides a road map for adopting and maturing the discipline drawn from the experience of hundreds of real-world practitioners. Seven new chapters include forecasting, adopting Finops, partnering with engineering, sustainability, the UI of FinOps, and connectivity to other frameworks. There are updates throughout the book, including 150 new pages of best practices and dozens of new stories. Drawing on real-world successes and failures of large-scale cloud spenders, the book outlines the process of building a culture of cloud FinOps in your organization. Engineering and finance teams, executives, and FinOps practitioners alike will learn how to build an efficient and effective FinOps machine for data-driven cloud value decision-making. With this book, you'll learn: The DNA of a highly functional cloud FinOps culture A road map to build executive support for FinOps adoption How to understand and forecast your cloud spending How to empower engineering and finance to work together Cost allocation strategies to create accountability for cloud and container spend Strategies for rate discounts from cloud commitments When and how to implement automation of repetitive cost tasks How to empower engineering team action on cost efficiency Using unit economics to drive data-driven decision-making
This open access book summarizes the research done and results obtained in the second funding phase of the Priority Program 1648 "Software for Exascale Computing" (SPPEXA) of the German Research Foundation (DFG) presented at the SPPEXA Symposium in Dresden during October 21-23, 2019. In that respect, it both represents a continuation of Vol. 113 in Springer's series Lecture Notes in Computational Science and Engineering, the corresponding report of SPPEXA's first funding phase, and provides an overview of SPPEXA's contributions towards exascale computing in today's sumpercomputer technology. The individual chapters address one or more of the research directions (1) computational algorithms, (2) system software, (3) application software, (4) data management and exploration, (5) programming, and (6) software tools. The book has an interdisciplinary appeal: scholars from computational sub-fields in computer science, mathematics, physics, or engineering will find it of particular interest.
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature.
The two-volume set IFIP AICT 639 and 640 constitutes the refereed post-conference proceedings of the 18th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2021, held in Curitiba, Brazil, during July 11-14, 2021. The conference was held virtually due to the COVID-19 crisis.The 107 revised full papers presented in these proceedings were carefully reviewed and selected from 133 submissions. The papers are organized in the following topical sections: Volume I: Sustainability, sustainable development and circular economy; sustainability and information technologies and services; green and blue technologies; AI and blockchain integration with enterprise applications; PLM maturity, PLM implementation and adoption within industry 4.0; and industry 4.0 and emerging technologies: Volume II: Design, education and management; lean, design and innovation technologies; information technology models and design; and models, manufacturing and information technologies and services.
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies
1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed
Recent advances in mobile and wireless communication and personal computer technology have created a new paradigm for information processing. Today, mobile and wireless communications exit in many forms, providing different types of services. Existing forms of mobile and wireless communications continue to experience rapid growth and new applications and approaches are being spawned at an increasing rate. Recently, the mobile and wireless Internet has become one of the most important issues in the telecommunications arena. The development of the mobile and wireless Internet is the evolution of several different technologies coming together to make the Internet more accessible. Technologies such as the Internet, wireless networks, and mobile computing have merged to form the mobile and wireless Internet. The mobile and wireless Internet extends traditional Internet and World Wide Web services to wireless devices such as cellular phones, Personal Digital Assistants (PDAs) and notebooks. Mobile and wireless Internet c: an give users access to personalized information anytime and anywhere they need it, and thus empower them to make decisions more quickly, and bring them closer to friends, family, and work colleagues. Wireless data communication methods have been around for sometime
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
Selected papers from the International Conference on New Computational Social Science, focusing on the following five aspects: Big data acquisition and analysis, Integration of qualitative research and quantitative research, Sociological Internet experiment research, Application of ABM simulation method in Sociology Research, Research and development of new social computing tools. With the rapid development of information technology, especially sweeping progress in the Internet of things, cloud computing, social networks, social media and big data, social computing, as a data-intensive science, is an emerging field that leverages the capacity to collect and analyze data with an unprecedented breadth, depth and scale. It represents a new computing paradigm and an interdisciplinary field of research and application. A broad comprehension of major topics involved in social computing is important for both scholars and practitioners. This proceedings presents and discusses key concepts and analyzes the state-of-the-art of the field. The conference not only gave insights on social computing, but also affords conduit for future research in the field. Social computing has two distinct trends: One is on the social science issues, such as computational social science, computational sociology, social network analysis, etc; The other is on the use of computational techniques. Finally some new challenges ahead are summarized, including interdisciplinary cooperation and training, big data sharing for scientific data mashups, and privacy protect.
This is the first book devoted to the positive multivariable 1D and 2D linear, time-invariant, finite-dimensional system. The book is based on the Author's lectures for Ph.D. students, delivered at Warsaw University of Technology in the academic year 1999/2000. The book consists of two parts; the first part is devoted to the 1D positive linear systems and the second to the 2D positive linear systems described by the Rosser model and the Fornasini-Marchesini models. Definitions, basic properties and theorems concerning positive matrices and graphs are presented; the externally and internally positive linear continuous-time and discrete-time linear systems are considered; the reachability, controlability and observability of positive linear systems are discussed. The realisation problem for positive 1D and 2D systems is considered, and the 2D models of externally and internally positive and their properties and controllability and minimum energy control of positive 2D systems are investigated.
Cloud functionality increases flexibility and capacity in IT systems, but it also adds complexity and requires a combination of business, financial and technical expertise to make it work effectively. Moreover, organizations often confuse availability with capacity, and assume incorrectly that using cloud services reduces the need to manage these factors. In Availability and Capacity Management in the Cloud: An ITSM narrative, Daniel McLean's fictional IT service management practitioner, Chris, faces the challenge of integrating cloud services into an ITSM structure. Based on the real-life experience of the author and other ITSM practitioners, this book tells the story of a cloud services implementation, exposing potential pitfalls and exploring how to handle issues that come with such projects. The end-of-chapter pointers give useful advice on dealing with the challenges organizations face when considering cloud services. Read this book and see how Chris meets the challenge of integrating cloud services with ITSM, and how you can do the same. Learn from the successes. Avoid the mistakes. |
You may like...
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R4,838
Discovery Miles 48 380
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,808
Discovery Miles 98 080
|