![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > General
This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.
The two volumes IFIP AICT 551 and 552 constitute the refereed proceedings of the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, held in Dar es Salaam, Tanzania, in May 2019. The 97 revised full papers and 2 short papers presented were carefully reviewed and selected from 185 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: communities, ICT-enabled networks, and development; digital platforms for development; ICT for displaced population and refugees. How it helps? How it hurts?; ICT4D for the indigenous, by the indigenous and of the indigenous; local technical papers; pushing the boundaries - new research methods, theory and philosophy in ICT4D; southern-driven human-computer interaction; sustainable ICT, informatics, education and learning in a turbulent world - "doing the safari way".
Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks with central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node diversity, and /or dynamical evolution. This is the first book entirely devoted to the new and emerging field of nonlinear dynamics of TCP/IP networks. It addresses both scientists and engineers working in the general field of communication networks.
This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted
The Manual of Digital Museum Planning is a comprehensive guide to digital planning, development, and operations for museum professionals and students of museums studies and arts administration. In the tradition of Lord Cultural Resource's renowned manuals, this book gives practical advice on how digital can enhance and improve all aspects of the museum. With chapters written by experienced professionals working at leading institutions such as the British Museum, the Metropolitan Museum of Art, the Indianapolis Museum of Art, Bristol Culture, the Canadian Museum for Human Rights, and others, The Manual of Digital Museum Planning is an easy-to-understand, step-by-step guide for anyone planning a new museum, a museum expansion, or a new project in the Digital Age. *Part 1 explains how digital technologies are transforming museums *and their value proposition *Part 2 explores how adopting a user-centric, omnichannel approach creates new relationships between museums and communities *Part 3 offers a guide to integrating digital into the workflow of museums- from data analytics, to user experience design to project management *Part 4 identifies the business models, infrastructure and skills and competencies for the digital museum, Each chapter culminates in 'summary takeaways' for easy recall, and key words are defined throughout. A glossary and reference list are also included as an accessible resources for readers.
The book consists of peer-reviewed papers from the 9th symposium on Location Based Services (LBS) which is targeted to researchers, industry/market operators and students of different backgrounds (scientific, engineering and humanistic). As the research field is developing and changing fast, this book follows up on current trends and gives suggestions and guidance to further research. This book offers a common ground bringing together various disciplines and practice, knowledge, experiences, plans and ideas on how LBS can and could be improved and on how it will influence both science and society. The book comprises front-end publications organized into sections on: spatial-temporal data acquisition, processing & analysis; positioning / indoor positioning; way-finding / navigation (indoor / outdoor) & smart mobile phone navigation; interactions, user studies and evaluations; innovative LBS systems & applications.
The Manual of Digital Museum Planning is a comprehensive guide to digital planning, development, and operations for museum professionals and students of museums studies and arts administration. In the tradition of Lord Cultural Resource's renowned manuals, this book gives practical advice on how digital can enhance and improve all aspects of the museum. With chapters written by experienced professionals working at leading institutions such as the British Museum, the Metropolitan Museum of Art, the Indianapolis Museum of Art, Bristol Culture, the Canadian Museum for Human Rights, and others, The Manual of Digital Museum Planning is an easy-to-understand, step-by-step guide for anyone planning a new museum, a museum expansion, or a new project in the Digital Age. *Part 1 explains how digital technologies are transforming museums *and their value proposition *Part 2 explores how adopting a user-centric, omnichannel approach creates new relationships between museums and communities *Part 3 offers a guide to integrating digital into the workflow of museums- from data analytics, to user experience design to project management *Part 4 identifies the business models, infrastructure and skills and competencies for the digital museum, Each chapter culminates in 'summary takeaways' for easy recall, and key words are defined throughout. A glossary and reference list are also included as an accessible resources for readers.
An indispensable guide to the newest version of the Google Certified Professional Cloud Architect certification The newly revised Second Edition of the Google Cloud Certified Professional Cloud Architect Study Guide delivers a proven and effective roadmap to success on the latest Professional Cloud Architect accreditation exam from Google. You'll learn the skills you need to excel on the test and in the field, with coverage of every exam objective and competency, including focus areas of the latest exam such as Kubernetes, Anthos, and multi-cloud architectures. The book explores the design, analysis, development, operations, and migration components of the job, with intuitively organized lessons that align with the real-world job responsibilities of a Google Cloud professional and with the PCA exam topics. Architects need more than the ability to recall facts about cloud services, they need to be able to reason about design decisions. This study guide is unique in how it helps you learn to think like an architect: understand requirements, assess constraints, choose appropriate architecture patterns, and consider the operational characteristics of the systems you design. Review questions and practice exams use scenario-based questions like those on the certification exam to build the test taking skills you will need. In addition to comprehensive material on compute resources, storage systems, networks, security, legal and regulatory compliance, reliability design, technical and business processes, and more, you'll get: The chance to begin or advance your career as an in-demand Google Cloud IT professional Invaluable opportunities to develop and practice the skills you'll need as a Google Cloud Architect Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The ideal resource for anyone preparing for the Professional Cloud Architect certification from Google, Google Cloud Certified Professional Cloud Architect Study Guide, 2nd Edition is also a must-read resource for aspiring and practicing cloud professionals seeking to expand or improve their technical skillset and improve their effectiveness in the field.
This book provides (i) entry-level knowledge on magnetism, (ii) production and application of prevalent magnetic materials, (iii) recent advances in emerging magnetic materials, (iv) connection between fundamental magnetism and materials design, (v) inspiration for application of magnetism and magnetic materials in multiple areas.
JavaScript is the programming language of the web and is used by more software developers today than any other programming language. For nearly 25 years this best seller has been the go-to guide for JavaScript programmers. The seventh edition is fully updated to cover the 2020 version of JavaScript, and new chapters cover classes, modules, iterators, generators, Promises, async/await, and metaprogramming. You'll find illuminating and engaging example code throughout. This book is for programmers who want to learn JavaScript and for web developers who want to take their understanding and mastery to the next level. It begins by explaining the JavaScript language itself, in detail, from the bottom up. It then builds on that foundation to cover the web platform and Node.js. Topics include: Types, values, variables, expressions, operators, statements, objects, and arrays Functions, classes, modules, iterators, generators, Promises, and async/await JavaScript's standard library: data structures, regular expressions, JSON, i18n, etc. The web platform: documents, components, graphics, networking, storage, and threads Node.js: buffers, files, streams, threads, child processes, web clients, and web servers Tools and language extensions that professional JavaScript developers rely on
Safely store secret information like passwords, keys, and certificates in Kubernetes. In this practical guide, you'll discover methods for adding layers of security that will defend the critical data of your applications. In Securing Kubernetes Secrets you will find: Strategies for storing secure assets in Kubernetes Cryptographic options and how to apply them in Kubernetes Using the HashiCorp Vault server on Kubernetes for secure secrets storage Managing security with public cloud providers Applying security concepts using tools from the Kubernetes ecosystem End-to-end secrets storage from development to operations Implementing in Kubernetes in CI/CD systems Secrets, like database passwords and API keys, are some of the most important data in your application. Securing Kubernetes Secrets reveals how to store these sensitive assets in Kubernetes in a way that's protected against leaks and hacks. You'll learn about the default capabilities of Kubernetes secrets, where they're lacking, and alternative options to strengthen applications and infrastructure. Kubernetes secrets include small and sensitive data like passwords, tokens, and keys. The security defaults of Kubernetes are rarely enough to protect this valuable data, and can leave it-and you-exposed. In this book, you'll learn how to bake security into Kubernetes-based applications right from the start with security best practices and reliable third-party tools like HashiCorp Vault
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
This book is a collection of chapters from the IFIP working groups 13.8 and 9.4. The 10 papers included present experiences and research on the topic of digital transformation and innovation practices in the global south. The topics span from digital transformation initiatives to novel innovative technological developments, practices and applications of marginalised people in the global south.
Fog Computing: Concepts, Frameworks, and Applications is arranged in such a way that readers with no prior experience in Fog Computing may explore this domain. It is an accessible source of information for distributed computing researchers as well as professionals looking to improve their security and connectivity understanding in Internet of Things (IoT) devices. This book is also useful for researchers and professionals working in the field of wireless communication security and privacy research. This book is intended for students, professionals, researchers, and developers who are working in or interested in the field of Fog Computing. One of the book's distinguishing aspects is that it covers a variety of case studies and future possibilities in the field of Fog Computing. This book: Begins by covering the fundamental notions of Fog Computing to help readers grasp the technology, starting from the basics Explains Fog Computing architecture as well as the convergence of Fog, IoT, and Cloud Computing Provides an assessment of Fog Computing and its applications in the field of IoT Discusses the usage of software defined networking and machine learning algorithms as they apply to Fog Computing Describes the different security and privacy issues with Fog Computing and explores single point control systems for consumer devices using Edge-Fog Computing Outlines in detail how to leverage Blockchain technology in Fog Computing, as well as how to use Fog Computing in telemedicine and healthcare applications Examines the usage of communication protocols, simulation tools for Fog Computing implementation, and case studies in the fields of bioinformatics, disaster control, and IoT
The basic concepts and building blocks for the design of Fine- (or FPGA) and Coarse-Grain Reconfigurable Architectures are discussed in this book. Recently-developed integrated architecture design and software-supported design flow of FPGA and coarse-grain reconfigurable architecture are also described. The book is accompanied by an interactive CD which includes case studies and lab projects for the design of FPGA and Coarse-grain architectures.
This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that demonstrate to an international community of health and IT experts how to bring the right stakeholders together and bridge classic divides between software architects and clinical end users, health system decision-makers and standard authors.
Most of our everyday life experiences are multisensory in nature; that is, they consist of what we see, hear, feel, taste, smell, and much more. Almost any experience you can think of, such as eating a meal or going to the cinema, involves a magnificent sensory world. In recent years, many of these experiences have been increasingly transformed and capitalised on through advancements that adapt the world around us - through technology, products, and services - to suit our ever more computerised environment. Multisensory Experiences: Where the senses meet technology looks at this trend and offers a comprehensive introduction to the dynamic world of multisensory experiences and design. It takes the reader from the fundamentals of multisensory experiences, through the relationship between the senses and technology, to finally what the future of those experiences may look like, and our responsibility in it. This book empowers you to shape your own and other people's experiences by considering the multisensory worlds that we live in through a journey that marries science and practice. It also shows how we can take advantage of the senses and how they shape our experiences through intelligent technological design.
Packed with hands-on applications, Tomsho's GUIDE TO OPERATING SYSTEMS, 6th Edition equips learners with fundamental theory and technical information as they work with today's most popular operating systems, including Windows, macOS and Linux platforms. Learners examine how general operating systems are organized and function. Hands-on scenarios give them practical experience in OS installation, upgrading and configuration. Processors, file systems, networking, virtualization, security, device management, storage, OS maintenance and troubleshooting are covered in detail. Content also includes Windows 10 and earlier Windows client OSs, Windows Server 2019 and earlier Windows server OSs, Fedora Linux, and macOS Mojave and earlier. Easily understood and highly practical, the sixth edition is an excellent resource for training across different operating systems.
Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures. Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts: Mobile and Ubiquitous Computing-illustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems Smart Environments and Agent Systems-discusses a new trend toward intelligent systems that are completely connected, proactive, intuitive, and constantly available Human-Computer Interaction and Multimedia Computing-describes guidelines for designing multisensory input and output for mobile devices Security, Privacy, and Trust Management-presents an approach to dynamically establish trust between a system and its mobile client in a flexible manner using a multi-agent negotiation mechanism Embedded Real-Time Systems-introduces novel work on how mobile, ubiquitous, and intelligence computing can be realized Networking Sensing and Communications-covers challenges, designs, and prototype solutions for establishing, managing, and maintaining current sensor networks in mobile and ubiquitous computing environments Containing the contributions of more than 70 researchers, practitioners, and academics from around the world, the book brings together the latest research on the subject to provide an understanding of the issues being addressed in the field. Filled with extensive references in each chapter, it provides you with the tools to participate in the design, implementation, and deployment of systems that are connected, proactive, intuitive, and constantly available.
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.
- Detailed examples of new technology and its important applications for global security and defence, sufficient guidelines for immediate implementations. - Aimed at system theorists, distributed algorithms designers, NASA, DARPA, and SDA network managers, defence and security personnel, university students interested in advanced MSc and PhD projects, and many others. - The book offers a concrete and very practical management solution for many problems described in other books in this area, which were presented mostly on general descriptive and qualitative levels
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
The book collects the latest research and thinking from international experts on green computing and the smart city. The financial and environmental costs of energy are a concern in smart cities due to the high usage of computing, technology, security, IoT, communications, traffic, and other technologies. This book tackles this problem with a focus on computing, reporting on various approaches being taken worldwide, illustrated by several international case studies demonstrating these approaches. Researchers use this book as an up-to-date reference and engineers use it as a guide for the design and implementation of real solutions. |
![]() ![]() You may like...
A Guide to the SIAC Arbitration Rules
John Choong, Mark Mangan, …
Hardcover
R7,243
Discovery Miles 72 430
International Commercial Arbitration - A…
Franco Ferrari, Friedrich Rosenfeld
Paperback
R1,157
Discovery Miles 11 570
Dispute Resolution in China, Europe and…
Lei Chen, Andre Janssen
Hardcover
R4,865
Discovery Miles 48 650
|