0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (51)
  • R250 - R500 (246)
  • R500+ (8,227)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Social Networking Communities and e-Dating Services - Concepts and Implications (Hardcover): Celia T. Romm, Kristina Setzekorn Social Networking Communities and e-Dating Services - Concepts and Implications (Hardcover)
Celia T. Romm, Kristina Setzekorn
R5,703 R5,153 Discovery Miles 51 530 Save R550 (10%) Ships in 12 - 17 working days

E-dating is now among the largest global e-commerce sectors, allowing for interaction that was once not possible. Despite its dominance in the e-commerce market and society, it is almost completely absent from the information systems research literature. Social Networking Communities and E-Dating Services: Concepts and Implications rectifies the absence of e-dating literature in the academic community by incorporating research from around the world, addressing the many aspects of e-dating and establishing it as a new research discipline. This unique collection of high quality international articles contributes toward the legitimization of e-dating as an area of research in e-commerce.

Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Hardcover): Irina Shamaeva, David... Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Hardcover)
Irina Shamaeva, David Michael Galley
R2,902 Discovery Miles 29 020 Ships in 12 - 17 working days

Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.

Digitising Enterprise in an Information Age - In an Information Age (Hardcover): David L. Olson, Subodh Kesharwani Digitising Enterprise in an Information Age - In an Information Age (Hardcover)
David L. Olson, Subodh Kesharwani
R3,042 Discovery Miles 30 420 Ships in 12 - 17 working days

Digitising Enterprise in an Information Age is an effort that focuses on a very vast cluster of Enterprises and their digitising technology involvement and take us through the road map of the implementation process in them, some of them being ICT, Banking, Stock Markets, Textile Industry & ICT, Social Media, Software Quality Assurance, Information Systems Security and Risk Management, Employee Resource Planning etc. It delves on increased instances of cyber spamming and the threat that poses to e-Commerce and Banking and tools that help and Enterprise toward of such threats. To quote Confucius, "As the water shapes itself to the vessel that contains it, so does a wise man adapts himself to circumstances." And the journey of evolution and progression will continue and institutions and enterprises will continue to become smarter and more and more technology savvy. Enterprises and businesses across all genre and spectrum are trying their level best to adopt to change and move on with the changing requirements of technology and as enterprises and companies upgrade and speed up their digital transformations and move their outdate heirloom systems to the cloud, archaic partners that don't keep up will be left behind. Note: T&F does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.

Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda - IFIP TC8 WG 8.6 International... Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda - IFIP TC8 WG 8.6 International Working Conference, June 14-16, 2007, Manchester, UK (Hardcover)
Tom McMaster, David Wastell, Elaine Ferneley, Janice I. DeGross
R4,298 Discovery Miles 42 980 Ships in 12 - 17 working days

This volume presents papers from the 10th Working Conference of the IFIP WG 8.6 on the adoption and diffusion of information systems and technologies. This book explores the dynamics of how some technological innovation efforts succeed while others fail. The book looks to expand the research agenda, paying special attention to the areas of theoretical perspectives, methodologies, and organizational sectors.

SCADA Security - Machine Learning Concepts for Intrusion Detection and Prevention (Hardcover): A Almalawi SCADA Security - Machine Learning Concepts for Intrusion Detection and Prevention (Hardcover)
A Almalawi
R2,722 Discovery Miles 27 220 Ships in 12 - 17 working days

Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book: Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems Describes the relationship between main components and three generations of SCADA systems Explains the classification of a SCADA IDS based on its architecture and implementation Surveys the current literature in the field and suggests possible directions for future research SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.

Making Risky and Important Decisions - A Leader's Guide (Hardcover): Ruth Murray-Webster, David Hillson Making Risky and Important Decisions - A Leader's Guide (Hardcover)
Ruth Murray-Webster, David Hillson
R1,998 Discovery Miles 19 980 Ships in 12 - 17 working days

This book offers a practical insight to leaders who need to make good decisions in risky and important situations. The authors describe a process for making risk-intelligent decisions, explaining complex ideas simply, and mapping a route through the myriad interrelated influences when groups make decisions that matter. The approach puts the decision maker-you-at the center and explains how you can think and act differently to make better decisions more of the time. The book shows how to Determine the appropriate level of risk Make decisions in uncertain and turbulent conditions Understand how risks are perceived to identify them accurately Develop new behaviors to improve decision-making Making Risky and Important Decisions: A Leader's Guide builds on earlier ground-breaking publications from these two recognized thought leaders. Their first book together, Understanding and Managing Risk Attitude, brought together the language of risk and risk-taking with the language of emotional intelligence and emotional literacy. Managing Group Risk Attitude followed, and focused on decision-making groups, creating new insights and frameworks. Both books are positioned as specialist textbooks, despite their relevance to real-world situations. A Short Guide to Risk Appetite brought together the concepts of risk appetite and risk attitude into one place for the first time, cutting through confusing terminology and confused thinking to create a practical way of understanding "how much risk is too much risk." This latest installment from Ruth Murray-Webster and David Hillson takes the breadth of their previous work, adds new insights and thinking, and distills it into a highly usable guide for hard-pressed leaders.

Software-Defined Data Infrastructure Essentials - Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft... Software-Defined Data Infrastructure Essentials - Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft (Paperback)
Greg Schulz
R1,416 Discovery Miles 14 160 Ships in 12 - 17 working days

Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills. From webscale, software-defined, containers, database, key-value store, cloud, and enterprise to small or medium-size business, the book is filled with techniques, and tips to help develop or refine your server storage I/O hardware, software, and services skills. Whether you are new to data infrastructures or a seasoned pro, you will find this comprehensive reference indispensable for gaining as well as expanding experience with technologies, tools, techniques, and trends. We had a front row seat watching Greg present live in our education workshop seminar sessions for ITC professionals in the Netherlands material that is in this book. We recommend this amazing book to expand your converged and data infrastructure knowledge from beginners to industry veterans. -Gert and Frank Brouwer, Brouwer Storage Consultancy Software-Defined Data Infrastructures Essentials provides the foundational building blocks to improve your craft in serval areas including applications, clouds, legacy, and more. IT professionals, as well as sales professionals and support personnel, stand to gain a great deal by reading this book.-Mark McSherry, Oracle Regional Sales Manager Looking to expand your data infrastructure IQ? From CIOS to operations, sales to engineering, this book is a comprehensive reference, a must read for IT infrastructure professionals, beginners to seasoned experts.-Tom Becchetti, Advisory Systems Engineer Greg Schulz has provided a complete 'toolkit' for storage management along with the background and framework for the storage or data infrastructure professional or those aspiring to become one.-Greg Brunton, Experienced Storage and Data Management Professional

Essential Enterprise Blockchain Concepts and Applications (Hardcover): Kavita Saini, Pethuru Chelliah, Deepak Saini Essential Enterprise Blockchain Concepts and Applications (Hardcover)
Kavita Saini, Pethuru Chelliah, Deepak Saini
R2,818 R2,218 Discovery Miles 22 180 Save R600 (21%) Ships in 12 - 17 working days

Blockchain is a technology that has attracted the attention of all types of businesses. Cryptocurrency such as Bitcoin has gained the most attention, but now companies are applying Blockchain technology to develop solutions improving traditional applications and securing all types of transactions. Robust and innovative, this technology is being combined with other well-known technologies including Cloud Computing, Big Data, and IoT to revolutionize outcomes in all verticals. Unlike books focused on financial applications, Essential Enterprise Blockchain Concepts and Applications is for researchers and practitioners who are looking for secure, viable, low-cost, and workable applications to solve a broad range of business problems. The book presents research that rethinks how to incorporate Blockchain with existing technology. Chapters cover various applications based on Blockchain technology including: Digital voting Smart contracts Supply chain management Internet security Logistics management Identity management Securing medical devices Asset management Blockchain plays a significant role in providing security for data operations. It defines how trusted transactions can be carried out and addresses Internet vulnerability problems. Blockchain solves the security fault line between AI and IoT in smart systems as well as in other systems using devices connected to each other through public networks. Linear and permanent indexed records are maintained by Blockchain to face the vulnerability issues in a wide variety applications. In addition to applications, the book also covers consensus algorithms and protocols and performance of Blockchain algorithms.

Amazon ECR User Guide (Hardcover): Development Team Amazon ECR User Guide (Hardcover)
Development Team
R911 Discovery Miles 9 110 Ships in 10 - 15 working days
Internet of Energy Handbook (Hardcover): Pawan Kumar, Srete Nikolovski, Z Y Dong Internet of Energy Handbook (Hardcover)
Pawan Kumar, Srete Nikolovski, Z Y Dong
R3,181 Discovery Miles 31 810 Ships in 12 - 17 working days

The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. Features Explains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilization Includes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generation Incorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoT Discusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensity This handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.

The Digital Reconstruction of Healthcare - Transitioning from Brick and Mortar to Virtual Care (Hardcover): Paul Cerrato, John... The Digital Reconstruction of Healthcare - Transitioning from Brick and Mortar to Virtual Care (Hardcover)
Paul Cerrato, John Halamka
R2,795 R2,195 Discovery Miles 21 950 Save R600 (21%) Ships in 12 - 17 working days

The complex challenges facing healthcare require innovative solutions that can make patient care more effective, easily available, and affordable. One such solution is the digital reconstruction of medicine that transitions much of patient care from hospitals, clinics, and offices to a variety of virtual settings. This reconstruction involves telemedicine, hospital-at-home services, mobile apps, remote sensing devices, clinical data analytics, and other cutting-edge technologies. The Digital Reconstruction of Healthcare: Transitioning from Brick and Mortar to Virtual Care takes a deep dive into these tools and how they can transform medicine to meet the unique needs of patients across the globe. This book enables readers to peer into the very near future and prepare them for the opportunities afforded by the digital shift in healthcare. It is also a wake-up call to readers who are less than enthusiastic about these digital tools and helps them to realize the cost of ignoring these tools. It is written for a wide range of medical professionals including: Physicians, nurses, and entrepreneurs who want to understand how to use or develop digital products and services IT managers who need to fold these tools into existing computer networks at hospitals, clinics, and medical offices Healthcare executives who decide how to invest in these platforms and products Insurers who need to stay current on the latest trends and the evidence to support their cost effectiveness Filled with insights from international experts, this book also features Dr. John Halamka's lessons learned from years of international consulting with government officials on digital health. It also taps into senior research analyst Paul Cerrato's expertise in AI, data analytics, and machine learning. Combining these lessons learned with an in-depth analysis of clinical informatics research, this book aims to separate hyped AI "solutions" from evidence-based digital tools. Together, these two pillars support the contention that these technologies can, in fact, help solve many of the seemingly intractable problems facing healthcare providers and patients.

Fuzzy Control, Estimation and Diagnosis - Single and Interconnected Systems (Hardcover, 1st ed. 2018): Magdi S. Mahmoud Fuzzy Control, Estimation and Diagnosis - Single and Interconnected Systems (Hardcover, 1st ed. 2018)
Magdi S. Mahmoud
R2,918 Discovery Miles 29 180 Ships in 10 - 15 working days

This textbook explains the principles of fuzzy systems in some depth together with information useful in realizing them within computational processes. The various algorithms and example problem solutions are a well-balanced and pertinent aid for research projects, laboratory work and graduate study. In addition to its worked examples, the book also uses end-of-chapter exercises as an instructional aid. The content of the book is developed and extended from material taught for four years in the author's classes. The text provides a broad overview of fuzzy control, estimation and fault diagnosis. It ranges over various classes of target system and modes of control and then turns to filtering, stabilization, and fault detection and diagnosis. Applications, simulation tools and an appendix on algebraic inequalities complete a unified approach to the analysis of single and interconnected fuzzy systems. Fuzzy Control, Estimation and Fault Detection is a guide for final-year undergraduate and graduate students of electrical and mechanical engineering, computer science and information technology, and will also be instructive for professionals in the information technology sector.

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback)
James Aweya
R2,028 Discovery Miles 20 280 Ships in 12 - 17 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback)
James Aweya
R2,042 Discovery Miles 20 420 Ships in 12 - 17 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover)
James Aweya
R4,880 Discovery Miles 48 800 Ships in 12 - 17 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover)
James Aweya
R4,868 Discovery Miles 48 680 Ships in 12 - 17 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

Formula 4.0 for Digital Transformation - A Business-Driven Digital Transformation Framework for Industry 4.0 (Paperback):... Formula 4.0 for Digital Transformation - A Business-Driven Digital Transformation Framework for Industry 4.0 (Paperback)
Venkatesh Upadrista
R1,287 Discovery Miles 12 870 Ships in 12 - 17 working days

A staggering 70% of digital transformations have failed as per McKinsey. The key reason why enterprises are failing in their digital transformation journey is because there is no standard framework existing in the industry that enterprises can use to transform themselves to digital. There are several books that speak about technologies such as Cloud, Artificial Intelligence and Data Analytics in silos, but none of these provides a holistic view on how enterprises can embark on a digital transformation journey and be successful using a combination of these technologies. FORMULA 4.0 is a methodology that provides clear guidance for enterprises aspiring to transform their traditional operating model to digital. Enterprises can use this framework as a readymade guide and plan their digital transformation journey. This book is intended for all chief executives, software managers, and leaders who intend to successfully lead this digital transformation journey. An enterprise can achieve success in digital transformation only of it can create an IT Platform that will enable them to adopt any new technology seamlessly into existing IT estate; deliver new products and services to the market in shorter durations; make business decisions with IT as an enabler and utilize automation in all its major business and IT processes. Achieving these goals is what defines a digital enterprise -- Formula 4.0 is a methodology for enterprises to achieve these goals and become digital. Essentially, there is no existing framework in the market that provides a step-by-step guide to enterprises on how to embark on their successful digital transformation journey. This book enables such transformations. Overall, the Formula 4.0 is an enterprise digital transformation framework that enables organizations to become truly digital.

Formula 4.0 for Digital Transformation - A Business-Driven Digital Transformation Framework for Industry 4.0 (Hardcover):... Formula 4.0 for Digital Transformation - A Business-Driven Digital Transformation Framework for Industry 4.0 (Hardcover)
Venkatesh Upadrista
R3,901 Discovery Miles 39 010 Ships in 12 - 17 working days

A staggering 70% of digital transformations have failed as per McKinsey. The key reason why enterprises are failing in their digital transformation journey is because there is no standard framework existing in the industry that enterprises can use to transform themselves to digital. There are several books that speak about technologies such as Cloud, Artificial Intelligence and Data Analytics in silos, but none of these provides a holistic view on how enterprises can embark on a digital transformation journey and be successful using a combination of these technologies. FORMULA 4.0 is a methodology that provides clear guidance for enterprises aspiring to transform their traditional operating model to digital. Enterprises can use this framework as a readymade guide and plan their digital transformation journey. This book is intended for all chief executives, software managers, and leaders who intend to successfully lead this digital transformation journey. An enterprise can achieve success in digital transformation only of it can create an IT Platform that will enable them to adopt any new technology seamlessly into existing IT estate; deliver new products and services to the market in shorter durations; make business decisions with IT as an enabler and utilize automation in all its major business and IT processes. Achieving these goals is what defines a digital enterprise -- Formula 4.0 is a methodology for enterprises to achieve these goals and become digital. Essentially, there is no existing framework in the market that provides a step-by-step guide to enterprises on how to embark on their successful digital transformation journey. This book enables such transformations. Overall, the Formula 4.0 is an enterprise digital transformation framework that enables organizations to become truly digital.

Information Theory, Mathematical Optimization, and Their Crossroads in 6G System Design (Hardcover, 1st ed. 2023): Shih-Chun... Information Theory, Mathematical Optimization, and Their Crossroads in 6G System Design (Hardcover, 1st ed. 2023)
Shih-Chun Lin, Tsung-Hui Chang, Eduard Jorswieck, Pin-Hsun Lin
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs. The contents focus on not only both theories but also their intersection in 6G. Motivations are from the multitude of new developments which will arise once 6G systems integrate new communication networks with AIoT (Artificial Intelligence plus Internet of Things). Design issues such as the intermittent connectivity, low latency, federated learning, IoT security, etc., are covered. This monograph provides a thorough picture of new results from information and optimization theories, as well as how their dialogues work to solve aforementioned 6G design issues.

From Markov Jump Processes to Spatial Queues (Hardcover, 2003 ed.): L Breuer From Markov Jump Processes to Spatial Queues (Hardcover, 2003 ed.)
L Breuer
R2,888 Discovery Miles 28 880 Ships in 10 - 15 working days

From Markov Jump Processes to Spatial Queues aims to develop a unified theory of spatial queues that yields concrete results for the performance analysis of mobile communication networks. A particular objective is to develop the most natural generalization of existing concepts (e.g. the BMAP) toward the needs of mobile communication networks. To these belong the spatial distribution of batch arrivals and users in the system as well as time-inhomogeneous (e.g. periodic) arrival intensities and user movements.

One of the major recent challenges for the stochastic modelling of communication systems is the emergence of wireless networks, which are used by more and more subscribers today. The main new feature of those, which is not covered by classical queuing theory, clearly is the importance of the user location within the area that is served by the base stations of the network.

In the framework of queuing theory, this opens up the natural extension of classical queuing models towards queues with a structured space in which users are served. The present book is intended to introduce this extension under the name of spatial queues. The main point of view and the general approach will be that of Markov jump processes. We start with a closer look into the theory. Then we present new results for the theory of stochastic processes as well as for classical queuing theory. Finally we introduce the new concepts of spatial Markovian arrival processes and spatial queues.

The main text is divided into three parts. The first part provides a new presentation of the theory of Markov jump processes. We derive a number of new results, especially for time-inhomogeneous processes, which have been neglected too much in the current textbooks on stochastic processes. For the first time, the class of Markov-additive jump processes is analysed in detail. This extends and unifies all Markovian arrival processes that have been proposed up to now (including arrivals for fluid queues) and provides a foundation for the subsequent introduction of spatial Markovian arrival processes.

The second part contains new results for classical queues with BMAP input. These include the first explicit formulae for the distribution of periodic queues. The class of fluid Markovian arrival processes is introduced, and we give statistical estimates for the parameters of a BMAP.

In the third part, the concepts of spatial Markovian arrival processes (abbreviated: SMAPs) and spatial queues are introduced. After that, periodic spatial Markovian queues are analysed as a model for the cells of a wireless communication network.
From Markov Jump Processes to Spatial Queues is intended to reach queuing theorists, researchers in the field of communication systems, as well as engineers with some background in probability theory. Furthermore, it is suitable as a textbook for advanced queuing theory on the graduate or post-graduate level.

Multiwavelength Optical Networks (Hardcover, 2002 ed.): Xiaohua Jia, Xiao-Dong Hu, Dingzhu Du Multiwavelength Optical Networks (Hardcover, 2002 ed.)
Xiaohua Jia, Xiao-Dong Hu, Dingzhu Du
R4,321 Discovery Miles 43 210 Ships in 12 - 17 working days

Multiwavelength Optical Networks systematically studies the major research issues in WDM (Wavelength Division Multiplexing) optical networks, such as routing and wavelength assignment, QoS multicast routing, design of logical topologies, and placement of wavelength converters. The book consists of two parts. The first part studies the fundamental concepts and principles of WDM networks. The second part discusses advanced and research issues of WDM networks.
The authors of the book have many years of working experience in the areas of computer networks and network optimization. The book discusses many difficult issues of WDM networks in a very comprehensive way. For each problem, there is a background discussion, and then the mathematical formulation, followed by the solutions.

Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Paperback): Jennifer Priestley,... Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Paperback)
Jennifer Priestley, Robert McGrath
R1,282 Discovery Miles 12 820 Ships in 12 - 17 working days

How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .

Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Hardcover): Jennifer Priestley,... Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Hardcover)
Jennifer Priestley, Robert McGrath
R3,032 Discovery Miles 30 320 Ships in 12 - 17 working days

How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .

Software-Defined Wide Area Network Architectures and Technologies (Hardcover): Cheng Sheng, Jie Bai, Qi Sun Software-Defined Wide Area Network Architectures and Technologies (Hardcover)
Cheng Sheng, Jie Bai, Qi Sun; Contributions by Chang-Qing Yang
R3,316 R3,036 Discovery Miles 30 360 Save R280 (8%) Ships in 12 - 17 working days

Starting with problems and challenges faced by enterprise WANs, Software-Defined Wide Area Network Architectures and Technologies provides a detailed description of SD-WAN's background and basic features, as well as the system architecture, operating mechanism, and application scenarios of the SD-WAN solution based on the implementation of Huawei SD-WAN Solution. It also explains key SD-WAN technologies and analyzes real SD-WAN deployment cases, affording readers with design methods and deployment suggestions for the SD-WAN solution. The information presented in this book is easy to understand and very practical. It enables you to become adept in the SD-WAN solution's implementation and design principles. The book is intended for ICT practitioners, such as network technical support engineers, network administrators, and network planning engineers, to use in studying theory. Furthermore, it serves as reference material for network technology enthusiasts. Authors Cheng Sheng is the Chief Architect of Huawei's SD-WAN Solution. He has nearly 20 years of experience in network product and solution design, as well as extensive expertise in product design and development, network planning and design, and network engineering project implementation. Jie Bai is an Architect of Huawei's SD-WAN Solution. He is well versed in Huawei security products and SD-WAN Solution and has written books such as Huawei Firewall Technology Talk as well as Huawei Anti-DDoS Technology Talk. Qi Sun is a Senior Information Architect of Huawei, and he is knowledgeable in Huawei SD-WAN Solution, CloudVPN Solution, and Cloud Management Solution. He also participated in the information architecture design and delivery of multiple solutions.

Enterprise Wireless Local Area Network Architectures and Technologies (Hardcover): Rihai Wu, Xun Yang, Xia Zhou, Yibo Wang Enterprise Wireless Local Area Network Architectures and Technologies (Hardcover)
Rihai Wu, Xun Yang, Xia Zhou, Yibo Wang; Contributions by Chang-Qing Yang
R3,357 R3,077 Discovery Miles 30 770 Save R280 (8%) Ships in 12 - 17 working days

This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. First, the book covers service challenges facing enterprise wireless networks, along with detailing the latest evolution of Wi-Fi standards, air interface performance, and methods for improving user experience in enterprise scenarios. Furthermore, it illustrates typical networking, planning, and scenario-specific design for enterprise WLANs, and provides readers with a comprehensive understanding of enterprise WLAN planning, design, and technical implementation, as well as suggestions for deployment. This is a practical and easy-to-understand guide to WLAN design, and is written for WLAN technical support and planning engineers, network administrators, and enthusiasts of network technology. Authors Rihai Wu is Chief Architect of Huawei's campus network WLAN solution with 16 years of experience in wireless communications product design and a wealth of expertise in network design and product development. He previously served as a designer and developer of products for Wideband Code Division Multiple Access (WCDMA), LTE indoor small cells, and WLAN. Xun Yang is a WLAN standard expert from Huawei. He has nine years of experience in formulating WLAN standards, and previously served as 802.11ac Secretary, 802.11ah PHY Ad-hoc Co-chair, and 802.11ax MU Ad Hoc Sub Group Co-chair. Mr. Yang oversees technical research, the promotion of standards, and industrialization in the WLAN field, and has filed more than 100 patents. Xia Zhou is a documentation engineer of Huawei's campus network WLAN solution. She has 10 years of experience in creating documents for campus network products. Ms. Zhou was previously in charge of writing manuals for Huawei data center switches, WLAN products, and campus network solutions. She is also the author of Campus Network Solution Deployment Guide and was a co-sponsor of technical sessions such as WLAN from Basics to Proficiency. Yibo Wang is a documentation engineer of Huawei's campus network WLAN solution. He has nine years of experience in creating documents for campus network products. Mr. Wang was previously in charge of writing manuals for Huawei switches, WLAN products, and routers. He was also a co-sponsor of technical sessions such as WLAN from Basics to Proficiency and HCIA-WLAN certification training courses.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, … Hardcover R6,527 Discovery Miles 65 270
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,212 R1,121 Discovery Miles 11 210
Model-Driven Development and Operation…
Dana Petcu, Peter Matthews, … Hardcover R1,339 Discovery Miles 13 390
Edge Networking - Internet of Edges
K Agha Hardcover R3,613 Discovery Miles 36 130
Integration and Implementation of the…
Pradeep Tomar Hardcover R7,022 Discovery Miles 70 220
Jumpstart Your Career in Data Centers…
Carrie Goetz Hardcover R1,143 R922 Discovery Miles 9 220
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800

 

Partners