0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (35)
  • R250 - R500 (213)
  • R500+ (7,945)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

The Internet Challenge: Technology and Applications - Proceedings of the 5th International Workshop held at the TU Berlin,... The Internet Challenge: Technology and Applications - Proceedings of the 5th International Workshop held at the TU Berlin, Germany, October 8th-9th, 2002 (Hardcover, 2002 ed.)
Gunter Hommel, Sheng Huanye
R2,746 Discovery Miles 27 460 Ships in 18 - 22 working days

The International Workshop on "The Internet Challenge: Technology and Applications" is the fifth in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universitat Berlin. The goal of those workshops is to bring together researchers from both universities in order to exchange research results achieved in common projects of the two partner universities or to present interesting new work that might lead to new cooperation. The series of workshops started in 1990 with the "International Workshop on Artificial Intelligence" and was continued with the "International Workshop on Advanced Software Technology" in 1994. Both workshops have been hosted by Shanghai Jiao Tong University. In 1998 the third workshop took place in Berlin. This "International Workshop on Communication Based Systems" was essentially based on results from the Graduiertenkolleg on Communication Based systems that was funded by the German Research Society (DFG) from 1991 to 2000. The fourth "International Workshop on Robotics and its Applications" was held in Shanghai in 2000 supported by VDIIVDE-GMA and GI.

Collaboration with Cloud Computing - Security, Social Media, and Unified Communications (Paperback): Ric Messier Collaboration with Cloud Computing - Security, Social Media, and Unified Communications (Paperback)
Ric Messier
R1,097 Discovery Miles 10 970 Ships in 10 - 15 working days

"Collaboration with Cloud Computing "discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information securityThe risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutionsPresents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studiesExplores the risks associated with the use of social media to the enterprise networkCovers the bring-your-own-device(BYOD) trend, including policy considerations and technical requirements"

IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Hardcover): Sanjiv Purba IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Hardcover)
Sanjiv Purba
R3,684 Discovery Miles 36 840 Ships in 10 - 15 working days

Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.

IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Paperback): Sanjiv Purba IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Paperback)
Sanjiv Purba
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.

The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover): Yves Caseau The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover)
Yves Caseau
R3,654 Discovery Miles 36 540 Ships in 10 - 15 working days

The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation.

Asynchronous On-Chip Networks and Fault-Tolerant Techniques (Hardcover): Wei Song, Guangda Zhang Asynchronous On-Chip Networks and Fault-Tolerant Techniques (Hardcover)
Wei Song, Guangda Zhang
R2,473 Discovery Miles 24 730 Ships in 10 - 15 working days

Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.

Fractal Teletraffic Modeling and Delay Bounds in Computer Communications (Hardcover): Ming Li Fractal Teletraffic Modeling and Delay Bounds in Computer Communications (Hardcover)
Ming Li
R2,100 Discovery Miles 21 000 Ships in 10 - 15 working days

* Network traffic is a type of fractal time series, attracting the interests of not only computer scientists but the scientists from various fields, ranging from statistics to engineering * Innovatively presents a traffic bound named by the author * Further proves the existing identity in min-plus convolution system and the computation formula of the identity

Risk Management - Concepts and Guidance, Fifth Edition (Paperback, 5th edition): Carl L. Pritchard, PMP, PMI-RMP, EVP Risk Management - Concepts and Guidance, Fifth Edition (Paperback, 5th edition)
Carl L. Pritchard, PMP, PMI-RMP, EVP
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This new edition of Risk Management: Concepts and Guidance supplies a look at risk in light of current information, yet remains grounded in the history of risk practice. Taking a holistic approach, it examines risk as a blend of environmental, programmatic, and situational concerns. Supplying comprehensive coverage of risk management tools, practices, and protocols, the book presents powerful techniques that can enhance organizational risk identification, assessment, and management-all within the project and program environments. Updated to reflect the Project Management Institute's A Guide to the Project Management Body of Knowledge (PMBOK (R) Guide), Fifth Edition, this edition is an ideal resource for those seeking Project Management Professional and Risk Management Professional certification. Emphasizing greater clarity on risk practice, this edition maintains a focus on the ability to apply "planned clairvoyance" to peer into the future. The book begins by analyzing the various systems that can be used to apply risk management. It provides a fundamental introduction to the basics associated with particular techniques, clarifying the essential concepts of risk and how they apply in projects. The second part of the book presents the specific techniques necessary to successfully implement the systems described in Part I. The text addresses project risk management from the project manager's perspective. It adopts PMI's perspective that risk is both a threat and an opportunity, and it acknowledges that any effective risk management practice must look at the potential positive events that may befall a project, as well as the negatives.Providing coverage of the concepts that many project management texts ignore, such as the risk response matrix and risk models, the book includes appendices filled with additional reference materials and supporting details that simplifying some of the most complex aspects of risk management.

Cryptofinance and Mechanisms of Exchange - The Making of Virtual Currency (Hardcover, 1st ed. 2019): Stephane Goutte, Khaled... Cryptofinance and Mechanisms of Exchange - The Making of Virtual Currency (Hardcover, 1st ed. 2019)
Stephane Goutte, Khaled Guesmi, Samir Saadi
R3,663 Discovery Miles 36 630 Ships in 10 - 15 working days

This book describes how the rapid advancement in encryption and network computing gave birth to new tools and products that have influenced the local and global economy alike. One recent and notable example is the emergence of virtual currencies (such as Bitcoin) also known as cryptocurrencies. Virtual currencies introduced a fundamental transformation that affected the way goods, services and assets are exchanged. As a result of its distributed ledgers based on blockchain, cryptocurrencies not only offer some unique advantages to the economy, investors, and consumers, but also pose considerable risks to users and challenges for regulators when fitting the new technology into the old legal framework. The core of this proposed book is to present and discuss the evidence on financial asset capabilities of virtual currencies. The contributors of this volume analyze several interesting and timely issues such as the particularities of virtual currencies and their statistical characteristics; the diversification benefits of virtual currencies; the behavior and dependence structure between virtual currencies and the financial markets; the economic implications of virtual currencies, their effects, their price risk, and contagion spillovers in a unified and comprehensive framework; the future of virtual currencies and their distributed ledgers technology.

The Basics of Cloud Computing - Understanding the Fundamentals of Cloud Computing in Theory and Practice (Paperback): Derrick... The Basics of Cloud Computing - Understanding the Fundamentals of Cloud Computing in Theory and Practice (Paperback)
Derrick Rountree, Ileana Castrillo
R676 R589 Discovery Miles 5 890 Save R87 (13%) Ships in 10 - 15 working days

As part of the Syngress Basics series, "The Basics of Cloud Computing "provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn t a part of their day-to-day responsibility.

Authors Derrick Rountree and Ileana Castrilloexplains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic.

This book gives readers a conceptual understanding and a framework for moving forward with cloud computing, as opposed to competing and related titles, which seek to be comprehensive guides to the cloud.

Provides a sound understanding of the cloud and how it works.

Describes both cloud deployment models and cloud services models, so you can make the best decisions for deployment.

Presents tips for selecting the best cloud services providers."

Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback): Liviu Gabriel Cretu, Florin... Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback)
Liviu Gabriel Cretu, Florin Dumitriu
R2,447 Discovery Miles 24 470 Ships in 18 - 22 working days

This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.

Electronics and Communications Engineering - Applications and Innovations (Paperback): T. Kishore Kumar, Ravi Kumar Jatoth, V... Electronics and Communications Engineering - Applications and Innovations (Paperback)
T. Kishore Kumar, Ravi Kumar Jatoth, V .V. Mani
R2,465 Discovery Miles 24 650 Ships in 18 - 22 working days

Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems

Mobile Microservices - Building Flexible Pervasive Applications (Hardcover): Nanxi Chen Mobile Microservices - Building Flexible Pervasive Applications (Hardcover)
Nanxi Chen
R2,020 Discovery Miles 20 200 Ships in 10 - 15 working days

In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times. This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.

Next-Generation Enterprise Security and Governance (Hardcover): Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland Next-Generation Enterprise Security and Governance (Hardcover)
Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland
R2,715 Discovery Miles 27 150 Ships in 10 - 15 working days

The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.

Advanced Technologies in Ad Hoc and Sensor Networks - Proceedings of the 7th China Conference on Wireless Sensor Networks... Advanced Technologies in Ad Hoc and Sensor Networks - Proceedings of the 7th China Conference on Wireless Sensor Networks (Hardcover, 2014 ed.)
Xue Wang, Li Cui, Zhongwen Guo
R4,813 Discovery Miles 48 130 Ships in 10 - 15 working days

"Advanced Technologies in Ad Hoc and Sensor Networks "collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of Advances in wireless sensor networks of China . The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book.

Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China."

Making Data Work - Enabling Digital Transformation, Empowering People and Advancing Organisational Success (Hardcover): Edosa... Making Data Work - Enabling Digital Transformation, Empowering People and Advancing Organisational Success (Hardcover)
Edosa Odaro
R3,517 Discovery Miles 35 170 Ships in 10 - 15 working days

In this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption-fear. Fear of the unknown, fear of the intangible, fear of the investment needed and, yes, fear of losing your job to a machine. With his talent for distilling clarity from complexity, Edosa tackles this and many other challenges. -Tim Carmichael, Chief Data Officer, Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data, information and knowledge across organisations. Yet, rather than being stuck with endless polarising debates such as breaking down silos, it shifts focus back towards the ultimate "to what end." -Jacky Wright, Chief Digital Officer (CDO), Microsoft US If you care about AI transformation, empowering people or advancing organisational success in an increasingly digital world, then you should read this book. -Yomi Ibosiola, Chief Data and Analytics Officer, Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when-at the end of a critical investment in an artificial intelligence project that had been meant to save money-it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer's production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to "make data work" for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation, empower people, and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes, where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities.

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Computational Intelligence for Wireless Sensor Networks - Principles and Applications (Book): Sandip Kumar Chaurasiya Computational Intelligence for Wireless Sensor Networks - Principles and Applications (Book)
Sandip Kumar Chaurasiya
R1,386 Discovery Miles 13 860 Ships in 10 - 15 working days
Internet of Things (Hardcover): Jan H. Oller, Vlasios Tsiatsis, Catherine Mulligan, Stamatis Karnouskos, Stefan Avesand, David... Internet of Things (Hardcover)
Jan H. Oller, Vlasios Tsiatsis, Catherine Mulligan, Stamatis Karnouskos, Stefan Avesand, …
R1,835 Discovery Miles 18 350 Ships in 10 - 15 working days

This book outlines the background and overall vision for the Internet of Things (IoT) and Machine-to-Machine (M2M) communications and services, including major standards. Key technologies are described, and include everything from physical instrumentation of devices to the cloud infrastructures used to collect data. Also included is how to derive information and knowledge, and how to integrate it into enterprise processes, as well as system architectures and regulatory requirements. Real-world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M technologies is described, including prospective changes in relevant standards. This book is written by experts in the technology and business aspects of Machine-to-Machine and Internet of Things, and who have experience in implementing solutions.

Standards included: ETSI M2M, IEEE 802.15.4, 3GPP (GPRS, 3G, 4G), Bluetooth Low Energy/Smart, IETF 6LoWPAN, IETF CoAP, IETF RPL, Power Line Communication, Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE), ZigBee, 802.11, Broadband Forum TR-069, Open Mobile Alliance (OMA) Device Management (DM), ISA100.11a, WirelessHART, M-BUS, Wireless M-BUS, KNX, RFID, Object Management Group (OMG) Business Process Modelling Notation (BPMN)Key technologies for M2M and IoTcovered: Embedded systems hardware and software, devices and gateways, capillary and M2M area networks, local and wide area networking, M2M Service Enablement, IoT data management and data warehousing, data analytics and big data, complex event processing and stream analytics, knowledge discovery and management, business process and enterprise integration, Software as a Service and cloud computingCombines both technical explanations together with design features of M2M/IoT and use cases. Together, these descriptions will assist you to develop solutions that will work in the real worldDetailed description of the network architectures and technologies that form the basis of M2M and IoTClear guidelines and examples of M2M and IoT use cases from real-world implementations such as Smart Grid, Smart Buildings, Smart Cities, Participatory Sensing, and Industrial AutomationA description of the vision for M2M and its evolution towards IoT"

The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Hardcover): Scott Coplan The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Hardcover)
Scott Coplan
R4,644 Discovery Miles 46 440 Ships in 10 - 15 working days

When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.

Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover)
Gizem Ozbayrac
R3,500 Discovery Miles 35 000 Ships in 10 - 15 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Fundamentals of Optical Computing Technology - Forward the Next Generation Supercomputer (Hardcover, 1st ed. 2018): Xiujian Li,... Fundamentals of Optical Computing Technology - Forward the Next Generation Supercomputer (Hardcover, 1st ed. 2018)
Xiujian Li, Zhengzheng Shao, Mengjun Zhu, Junbo Yang
R5,023 Discovery Miles 50 230 Ships in 10 - 15 working days

This book presents the principles, experimental technologies, up-to-date research findings and applications of various optical-computing technologies and devices. It also discusses semiconductor multiple quantum well (MQW) photoelectronic devices, vertical-cavity surface-emitting lasers (VCSELs), lasers, micro optical elements and diffractive optical elements, optical storage, optical parallel interconnections, and optical-buffer technology as the main technologies for optical computing. Furthermore, it explores the potential of optical-computing technology. It offers those involved in optical design, photonics, and photoelectronic research and related industries insights into the fundamentals and theories of optical computing, enabling them and to extend and develop the functions of fundamental elements to meet the requirement of optical-computing systems.

Data Center Handbook - Plan, Design, Build, and Operations of a Smart Data Center, 2nd Edition (Hardcover, 2nd Edition): H Geng Data Center Handbook - Plan, Design, Build, and Operations of a Smart Data Center, 2nd Edition (Hardcover, 2nd Edition)
H Geng
R4,060 Discovery Miles 40 600 Ships in 18 - 22 working days

DATA CENTER HANDBOOK Written by 59 experts and reviewed by a seasoned technical advisory board, the Data Center Handbook is a thoroughly revised, one-stop resource that clearly explains the fundamentals, advanced technologies, and best practices used in planning, designing, building and operating a mission-critical, energy-efficient, sustainable data center. This handbook, in its second edition, covers anatomy, ecosystem and taxonomy of data centers that enable the Internet of Things and artificial intelligent ecosystems and encompass the following: SECTION 1: DATA CENTER OVERVIEW AND STRATEGIC PLANNING Megatrends, the IoT, artificial intelligence, 5G network, cloud and edge computing Strategic planning forces, location plan, and capacity planning Green design & construction guidelines and best practices Energy demand, conservation, and sustainability strategies Data center financial analysis & risk management SECTION 2: DATA CENTER TECHNOLOGIES Software-defined environment Computing, storage, network resource management Wireless sensor networks in data centers ASHRAE data center guidelines Data center telecommunication cabling, BICSI and TIA 942 Rack-level and server-level cooling Corrosion and contamination control Energy saving technologies and server design Microgrid and data centers SECTION 3: DATA CENTER DESIGN & CONSTRUCTION Data center site selection Architecture design: rack floor plan and facility layout Mechanical design and cooling technologies Electrical design and UPS Fire protection Structural design Reliability engineering Computational fluid dynamics Project management SECTION 4: DATA CENTER OPERATIONS TECHNOLOGIES Benchmarking metrics and assessment Data center infrastructure management Data center air management Disaster recovery and business continuity management The Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center belongs on the bookshelves of any professionals who work in, with, or around a data center.

Wireless Sensor Networks and the Internet of Things - Future Directions and Applications (Hardcover): Bhagirathi Nayak,... Wireless Sensor Networks and the Internet of Things - Future Directions and Applications (Hardcover)
Bhagirathi Nayak, Subhendu Kumar Pani, Tanupriya Choudhury, Suneeta Satpathy, Sachi Nandan Mohanty
R4,066 Discovery Miles 40 660 Ships in 10 - 15 working days

Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.

Cyber-Physical Systems - Solutions to Pandemic Challenges (Hardcover): Tushar Semwal, Faiz Iqbal Cyber-Physical Systems - Solutions to Pandemic Challenges (Hardcover)
Tushar Semwal, Faiz Iqbal
R4,938 Discovery Miles 49 380 Ships in 10 - 15 working days

Introducing strong foundations to practical Cyber-Physical Systems Leveraging CPS for pandemic affected society Ensuring Secured and Privacy aware CPS for Sensitive Data in a pandemic situation Providing methodologies to deploy CPS in industries affect by a pandemic

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Behind Prison Walls - Unlocking a Safer…
Edwin Cameron, Rebecca Gore, … Paperback R350 R312 Discovery Miles 3 120
Rosalind Franklin, Volume 65
Maria Isabel Sanchez Vegara Hardcover R380 R270 Discovery Miles 2 700
Basil Dreams Big
Lu Fraser Paperback R240 R214 Discovery Miles 2 140
None The Number
Oliver Jeffers Paperback  (2)
R261 R237 Discovery Miles 2 370
The Unicorn That Said No
Marc-Uwe Kling Paperback R198 Discovery Miles 1 980
Tronkhond
China Mouton Paperback R193 Discovery Miles 1 930
Wonderfully Made
Tshwanelo Serumola Paperback  (1)
R160 R145 Discovery Miles 1 450
Prisoners of Rhodesia - Inmates and…
M. Munochiveyi Hardcover R2,496 R1,866 Discovery Miles 18 660
Irish Political Prisoners 1960-2000…
Sean McConville Paperback R1,636 Discovery Miles 16 360
Albert Einstein, Volume 72
Maria Isabel Sanchez Vegara Hardcover R295 R241 Discovery Miles 2 410

 

Partners