0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (41)
  • R250 - R500 (211)
  • R500+ (7,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Edge Computing and Capability-Oriented Architecture (Hardcover): Haishi Bai, Boris Scholl Edge Computing and Capability-Oriented Architecture (Hardcover)
Haishi Bai, Boris Scholl
R2,596 Discovery Miles 25 960 Ships in 10 - 15 working days

Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .

Cybersecurity Issues in Emerging Technologies (Hardcover): Leandros Maglaras, Ioanna Kantzavelou Cybersecurity Issues in Emerging Technologies (Hardcover)
Leandros Maglaras, Ioanna Kantzavelou
R2,430 Discovery Miles 24 300 Ships in 10 - 15 working days

The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.

Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications... Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, Manchester, UK, June 10-11, 2020, Proceedings (Hardcover, 1st ed. 2020)
Julian M. Bass, P.J. Wall
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.

Deep Learning for Biomedical Applications (Hardcover): Utku Kose, Omer Deperlioglu, D. Jude Hemanth Deep Learning for Biomedical Applications (Hardcover)
Utku Kose, Omer Deperlioglu, D. Jude Hemanth
R4,507 Discovery Miles 45 070 Ships in 10 - 15 working days

This book is a detailed reference on biomedical applications using Deep Learning. Because Deep Learning is an important actor shaping the future of Artificial Intelligence, its specific and innovative solutions for both medical and biomedical are very critical. This book provides a recent view of research works on essential, and advanced topics. The book offers detailed information on the application of Deep Learning for solving biomedical problems. It focuses on different types of data (i.e. raw data, signal-time series, medical images) to enable readers to understand the effectiveness and the potential. It includes topics such as disease diagnosis, image processing perspectives, and even genomics. It takes the reader through different sides of Deep Learning oriented solutions. The specific and innovative solutions covered in this book for both medical and biomedical applications are critical to scientists, researchers, practitioners, professionals, and educations who are working in the context of the topics.

Internet of Energy for Smart Cities - Machine Learning Models and Techniques (Hardcover): Anish Jindal, Neeraj Kumar, Gagangeet... Internet of Energy for Smart Cities - Machine Learning Models and Techniques (Hardcover)
Anish Jindal, Neeraj Kumar, Gagangeet Singh Aujla
R4,506 Discovery Miles 45 060 Ships in 10 - 15 working days

Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid, this book: Covers all aspects of Internet of Energy (IoE) and smart cities including research problems and solutions. Points to the solutions provided by machine learning to optimize the grids within a smart city set-up. Discusses relevant IoE design principles and architecture. Helps to automate various services in smart cities for energy management. Includes case studies to show the effectiveness of the discussed schemes.

Kali Linux Penetration Testing Bible (Paperback): G Khawaja Kali Linux Penetration Testing Bible (Paperback)
G Khawaja
R997 R865 Discovery Miles 8 650 Save R132 (13%) Ships in 18 - 22 working days

Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python

Electronics and Communications Engineering - Applications and Innovations (Paperback): T. Kishore Kumar, Ravi Kumar Jatoth, V... Electronics and Communications Engineering - Applications and Innovations (Paperback)
T. Kishore Kumar, Ravi Kumar Jatoth, V .V. Mani
R2,465 Discovery Miles 24 650 Ships in 18 - 22 working days

Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems

Cognitive Readiness in Project Teams - Reducing Project Complexity and Increasing Success in Project Management (Paperback):... Cognitive Readiness in Project Teams - Reducing Project Complexity and Increasing Success in Project Management (Paperback)
Carl Belack, Daniele Di Filippo, Ivano Di Filippo
R1,103 Discovery Miles 11 030 Ships in 10 - 15 working days

Issues surrounding business complexity plague organizations throughout the world. This situation is particularly true of the numerous complex projects and programs upon which organizations embark on a regular basis. Current project management processes and standards are based on Newtonian/Cartesian principles, such as linearity, reductionism, and single source problem causation. However, complex projects exhibit both Newtonian/Cartesian characteristics and complex systems characteristics, such as emergence, self-organization, non-linearity, non-reductionism, and multi-source problem causation. To conduct successful projects, complementary ways of approaching projects are required, and new competencies for those who manage projects and for those on project teams are required as well. There are a number of books available to help project managers and teams address the issue of systems behavior. However, there are none that approach complex projects from a neuroscience-based approach to human behavior and ambiguity. This book does exactly that in order to reduce project complexity and thereby increase the probability of project success. Cognitive Readiness in Project Teams looks to the concept of cognitive readiness (CR), first developed by the United States Department of Defense to better prepare and manage teams of individuals in complex battlefield situations. Its intent is to make project managers and teams more focused, responsive, resilient and adaptive through self-mastery and the mastering of interpersonal relationships. It introduces a CR framework for project managers and teams. This framework has neuroscience fundamentals and theorems as the foundation for the three pillars of CR: mindfulness, emotional intelligence, and social intelligence. The book is a compendium of chapters written by renowned authors in the fields of project management, neuroscience, mindfulness, and emotional and social intelligence.

Transformation and Your New EHR - The Communications and Change Leadership Playbook for Implementing Electronic Health Records... Transformation and Your New EHR - The Communications and Change Leadership Playbook for Implementing Electronic Health Records (Paperback)
Dennis R. Delisle, Andy McLamb, Samantha Inch
R1,092 Discovery Miles 10 920 Ships in 10 - 15 working days

Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health record (EHR) implementations and transformation journeys. This book highlights the approach and philosophy of communication, change leadership, and systems and process design, giving readers a practical view into the successes and failures that can be experienced throughout the evolution of an EHR implementation.

Big Data in the Arts and Humanities - Theory and Practice (Paperback): Giovanni Schiuma, Daniela Carlucci Big Data in the Arts and Humanities - Theory and Practice (Paperback)
Giovanni Schiuma, Daniela Carlucci
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

As digital technologies occupy a more central role in working and everyday human life, individual and social realities are increasingly constructed and communicated through digital objects, which are progressively replacing and representing physical objects. They are even shaping new forms of virtual reality. This growing digital transformation coupled with technological evolution and the development of computer computation is shaping a cyber society whose working mechanisms are grounded upon the production, deployment, and exploitation of big data. In the arts and humanities, however, the notion of big data is still in its embryonic stage, and only in the last few years, have arts and cultural organizations and institutions, artists, and humanists started to investigate, explore, and experiment with the deployment and exploitation of big data as well as understand the possible forms of collaborations based on it. Big Data in the Arts and Humanities: Theory and Practice explores the meaning, properties, and applications of big data. This book examines therelevance of big data to the arts and humanities, digital humanities, and management of big data with and for the arts and humanities. It explores the reasons and opportunities for the arts and humanities to embrace the big data revolution. The book also delineates managerial implications to successfully shape a mutually beneficial partnership between the arts and humanities and the big data- and computational digital-based sciences. Big data and arts and humanities can be likened to the rational and emotional aspects of the human mind. This book attempts to integrate these two aspects of human thought to advance decision-making and to enhance the expression of the best of human life.

Citrix XenDesktop Implementation - A Practical Guide for IT Professionals (Paperback): Gareth R. James Citrix XenDesktop Implementation - A Practical Guide for IT Professionals (Paperback)
Gareth R. James
R1,044 R801 Discovery Miles 8 010 Save R243 (23%) Ships in 10 - 15 working days

Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals.

Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Paperback): Irina Shamaeva, David... Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Paperback)
Irina Shamaeva, David Michael Galley
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.

Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Hardcover): Irina Shamaeva, David... Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Hardcover)
Irina Shamaeva, David Michael Galley
R3,364 Discovery Miles 33 640 Ships in 10 - 15 working days

Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.

Digitising Enterprise in an Information Age - In an Information Age (Hardcover): David L. Olson, Subodh Kesharwani Digitising Enterprise in an Information Age - In an Information Age (Hardcover)
David L. Olson, Subodh Kesharwani
R3,505 Discovery Miles 35 050 Ships in 10 - 15 working days

Digitising Enterprise in an Information Age is an effort that focuses on a very vast cluster of Enterprises and their digitising technology involvement and take us through the road map of the implementation process in them, some of them being ICT, Banking, Stock Markets, Textile Industry & ICT, Social Media, Software Quality Assurance, Information Systems Security and Risk Management, Employee Resource Planning etc. It delves on increased instances of cyber spamming and the threat that poses to e-Commerce and Banking and tools that help and Enterprise toward of such threats. To quote Confucius, "As the water shapes itself to the vessel that contains it, so does a wise man adapts himself to circumstances." And the journey of evolution and progression will continue and institutions and enterprises will continue to become smarter and more and more technology savvy. Enterprises and businesses across all genre and spectrum are trying their level best to adopt to change and move on with the changing requirements of technology and as enterprises and companies upgrade and speed up their digital transformations and move their outdate heirloom systems to the cloud, archaic partners that don't keep up will be left behind. Note: T&F does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.

Securing Systems - Applied Security Architecture and Threat Models (Paperback): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Paperback)
Brook S. E. Schoenfield
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Next-Generation Wireless Technologies - 4G and Beyond (Hardcover, 2013 ed.): Naveen Chilamkurti, Sherali Zeadally, Hakima... Next-Generation Wireless Technologies - 4G and Beyond (Hardcover, 2013 ed.)
Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi
R4,198 R3,397 Discovery Miles 33 970 Save R801 (19%) Ships in 10 - 15 working days

This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet of Things' from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.

Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised... Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised Selected Papers (Hardcover, 1st ed. 2021)
Zhongzhi Shi, Mihir Chakraborty, Samarjit Kar
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.

Essential Enterprise Blockchain Concepts and Applications (Hardcover): Kavita Saini, Pethuru Chelliah, Deepak Saini Essential Enterprise Blockchain Concepts and Applications (Hardcover)
Kavita Saini, Pethuru Chelliah, Deepak Saini
R2,364 Discovery Miles 23 640 Ships in 10 - 15 working days

Blockchain is a technology that has attracted the attention of all types of businesses. Cryptocurrency such as Bitcoin has gained the most attention, but now companies are applying Blockchain technology to develop solutions improving traditional applications and securing all types of transactions. Robust and innovative, this technology is being combined with other well-known technologies including Cloud Computing, Big Data, and IoT to revolutionize outcomes in all verticals. Unlike books focused on financial applications, Essential Enterprise Blockchain Concepts and Applications is for researchers and practitioners who are looking for secure, viable, low-cost, and workable applications to solve a broad range of business problems. The book presents research that rethinks how to incorporate Blockchain with existing technology. Chapters cover various applications based on Blockchain technology including: Digital voting Smart contracts Supply chain management Internet security Logistics management Identity management Securing medical devices Asset management Blockchain plays a significant role in providing security for data operations. It defines how trusted transactions can be carried out and addresses Internet vulnerability problems. Blockchain solves the security fault line between AI and IoT in smart systems as well as in other systems using devices connected to each other through public networks. Linear and permanent indexed records are maintained by Blockchain to face the vulnerability issues in a wide variety applications. In addition to applications, the book also covers consensus algorithms and protocols and performance of Blockchain algorithms.

SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover): Zhenbin Li, Zhibo Hu, Cheng Li SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover)
Zhenbin Li, Zhibo Hu, Cheng Li; Contributions by Chang-Qing Yang
R3,954 Discovery Miles 39 540 Ships in 10 - 15 working days

SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.

Making Risky and Important Decisions - A Leader's Guide (Hardcover): Ruth Murray-Webster, David Hillson Making Risky and Important Decisions - A Leader's Guide (Hardcover)
Ruth Murray-Webster, David Hillson
R2,200 Discovery Miles 22 000 Ships in 10 - 15 working days

This book offers a practical insight to leaders who need to make good decisions in risky and important situations. The authors describe a process for making risk-intelligent decisions, explaining complex ideas simply, and mapping a route through the myriad interrelated influences when groups make decisions that matter. The approach puts the decision maker-you-at the center and explains how you can think and act differently to make better decisions more of the time. The book shows how to Determine the appropriate level of risk Make decisions in uncertain and turbulent conditions Understand how risks are perceived to identify them accurately Develop new behaviors to improve decision-making Making Risky and Important Decisions: A Leader's Guide builds on earlier ground-breaking publications from these two recognized thought leaders. Their first book together, Understanding and Managing Risk Attitude, brought together the language of risk and risk-taking with the language of emotional intelligence and emotional literacy. Managing Group Risk Attitude followed, and focused on decision-making groups, creating new insights and frameworks. Both books are positioned as specialist textbooks, despite their relevance to real-world situations. A Short Guide to Risk Appetite brought together the concepts of risk appetite and risk attitude into one place for the first time, cutting through confusing terminology and confused thinking to create a practical way of understanding "how much risk is too much risk." This latest installment from Ruth Murray-Webster and David Hillson takes the breadth of their previous work, adds new insights and thinking, and distills it into a highly usable guide for hard-pressed leaders.

The Digital Reconstruction of Healthcare - Transitioning from Brick and Mortar to Virtual Care (Hardcover): Paul Cerrato, John... The Digital Reconstruction of Healthcare - Transitioning from Brick and Mortar to Virtual Care (Hardcover)
Paul Cerrato, John Halamka
R2,455 Discovery Miles 24 550 Ships in 10 - 15 working days

The complex challenges facing healthcare require innovative solutions that can make patient care more effective, easily available, and affordable. One such solution is the digital reconstruction of medicine that transitions much of patient care from hospitals, clinics, and offices to a variety of virtual settings. This reconstruction involves telemedicine, hospital-at-home services, mobile apps, remote sensing devices, clinical data analytics, and other cutting-edge technologies. The Digital Reconstruction of Healthcare: Transitioning from Brick and Mortar to Virtual Care takes a deep dive into these tools and how they can transform medicine to meet the unique needs of patients across the globe. This book enables readers to peer into the very near future and prepare them for the opportunities afforded by the digital shift in healthcare. It is also a wake-up call to readers who are less than enthusiastic about these digital tools and helps them to realize the cost of ignoring these tools. It is written for a wide range of medical professionals including: Physicians, nurses, and entrepreneurs who want to understand how to use or develop digital products and services IT managers who need to fold these tools into existing computer networks at hospitals, clinics, and medical offices Healthcare executives who decide how to invest in these platforms and products Insurers who need to stay current on the latest trends and the evidence to support their cost effectiveness Filled with insights from international experts, this book also features Dr. John Halamka's lessons learned from years of international consulting with government officials on digital health. It also taps into senior research analyst Paul Cerrato's expertise in AI, data analytics, and machine learning. Combining these lessons learned with an in-depth analysis of clinical informatics research, this book aims to separate hyped AI "solutions" from evidence-based digital tools. Together, these two pillars support the contention that these technologies can, in fact, help solve many of the seemingly intractable problems facing healthcare providers and patients.

The DataOps Revolution - Delivering the Data-Driven Enterprise (Paperback): Simon Trewin The DataOps Revolution - Delivering the Data-Driven Enterprise (Paperback)
Simon Trewin
R1,095 Discovery Miles 10 950 Ships in 10 - 15 working days

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.

Internet of Energy Handbook (Hardcover): Pawan Kumar, Srete Nikolovski, Z Y Dong Internet of Energy Handbook (Hardcover)
Pawan Kumar, Srete Nikolovski, Z Y Dong
R3,646 Discovery Miles 36 460 Ships in 10 - 15 working days

The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. Features Explains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilization Includes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generation Incorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoT Discusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensity This handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback)
James Aweya
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback)
James Aweya
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Performing Englishness - Identity and…
Trish Winter, Simon Keegan-Phipps Paperback R889 Discovery Miles 8 890
Prayer that Really Works
Cheri-Anne Rougier Hardcover R712 R636 Discovery Miles 6 360
Gypsies and Flamenco - The Emergence of…
Bernard Leblon Paperback R323 Discovery Miles 3 230
Boss' Secret Baby - A Billionaire's…
Michelle Love Hardcover R606 Discovery Miles 6 060
Flashpoint
Wilbur Smith, David Churchill Hardcover R399 R315 Discovery Miles 3 150
Sharpeville - An Apartheid Massacre and…
Tom Lodge Hardcover R785 Discovery Miles 7 850
Fatal Gambit
David Lagercrantz Paperback R425 R379 Discovery Miles 3 790
Video-Based Surveillance Systems…
Graeme A. Jones, Nikos Paragios, … Hardcover R5,298 Discovery Miles 52 980
The Maypole Manual
Mike Ruff, Jenny Read Paperback R872 Discovery Miles 8 720
Abyssinian Cat Affirmations Workbook…
Live Positivity Paperback R476 Discovery Miles 4 760

 

Partners