0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (51)
  • R250 - R500 (249)
  • R500+ (8,245)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and... Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and Wireless Communications Networks, August 20-25, 2006, Santiago, Chile (Hardcover, 1992. 2nd Print)
Guy Pujolle
R2,807 Discovery Miles 28 070 Ships in 10 - 15 working days

This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has been held in a Latin American country.

Topics in this series include:

  • The 4th International Conference on Theoretical Computer Science
  • Education for the 21st Century- Impact of ICT and Digital Resources
  • Mobile and Wireless Communication Networks
  • Ad-Hoc Networking
  • Network Control and Engineering for QoS, Security, and Mobility
  • The Past and Future of Information Systems: 1976-2006 and Beyond
  • History of Computing and Education
  • Biologically Inspired Cooperative Computing
  • Artificial Intelligence in Theory and Practice
  • Applications in Artificial Intelligence
  • Advanced Software Engineering: Expanding the Frontiers of Software

For a complete list of the more than 300 titles in the IFIP Series, visit springer.com.

For more information about IFIP, please visit ifip.org.

Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.): Ying Zhang Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.)
Ying Zhang
R8,791 R8,166 Discovery Miles 81 660 Save R625 (7%) Ships in 12 - 17 working days

This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.): Ajith Abraham, Aboul Ella... Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.)
Ajith Abraham, Aboul Ella Hassanien, Vaclav Snasel
R4,887 R4,369 Discovery Miles 43 690 Save R518 (11%) Ships in 12 - 17 working days

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services.

This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.

Real-Time Modelling and Processing for Communication Systems - Applications and Practices (Hardcover, 1st ed. 2018): Muhammad... Real-Time Modelling and Processing for Communication Systems - Applications and Practices (Hardcover, 1st ed. 2018)
Muhammad Alam, Wael Dghais, Yuanfang Chen
R2,819 Discovery Miles 28 190 Ships in 10 - 15 working days

This book presents cutting-edge work on real-time modelling and processing, a highly active research field in both the research and industrial domains. Going beyond conventional real-time systems, major efforts are required to develop accurate and computational efficient real-time modelling algorithms and design automation tools that reflect the technological advances in high-speed and ultra-low-power transceiver communication architectures based on nanoscale devices. The book addresses basic and more advanced topics, such as I/O buffer circuits for ensuring reliable chip-to-chip communication, I/O buffer behavioural modelling, multiport empirical models for memory interfaces, compact behavioural modelling for memristive devices, and resource reservation modelling for distributed embedded systems. The respective chapters detail new research findings, new models, algorithms, implementations and simulations of the above-mentioned topics. As such, the book will help both graduate students and researchers understand the latest research into real-time modelling and processing.

Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.): Charles R. Kalmanek, Sudip Misra, Yang (Richard)... Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.)
Charles R. Kalmanek, Sudip Misra, Yang (Richard) Yang
R4,974 R4,407 Discovery Miles 44 070 Save R567 (11%) Ships in 12 - 17 working days

An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.

Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000),... Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000), September 14-15, 2000, Gdansk, Poland (Hardcover, 2000 ed.)
Jozef Wozniak, Jerzy Konorski
R4,321 Discovery Miles 43 210 Ships in 12 - 17 working days

There are numerous factors contributing to the dynamic growth of wireless communication systems we've been observing in the past 10 years, the most important being the increasing network user mobility and the technological advances in high-speed data transmission over radio channels. Research centres and standards-making institutions the world over conduct works on 3G integrated systems of person-to-person and person-to-computer communications, wireless counterparts of classical LAN, ATM and IP architectures, satellite and access networks as well as advanced service platforms like W AP and other concepts. Among the many commercial and non-profit organisations professionally involved in the development of the new information infrastructure, of particular influence is the International Federation for Information Processing. Within its Technical Committee TC-6, a working group WG 6.8 has been set up to co-ordinate IFIP activities in the area of wireless communications. It has done so, among others, by arranging regular meetings of academic and industrial researchers, known as IFIP TC-6 WG 6.8 Workshops on Personal Wireless Communications (pWC). Such workshops were held in recent years in Prague, Frankfurt/M, Tokyo and Copenhagen, and their success has resulted in the promotion of PWC to the status of IFIP Working Conference.

A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.): Thomas Baigneres, Pascal Junod, Yi Lu, Jean... A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,371 Discovery Miles 13 710 Ships in 12 - 17 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science]Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Mutimedia Networking-Technology Management and Applications (Paperback): Rahman Mutimedia Networking-Technology Management and Applications (Paperback)
Rahman
R2,442 Discovery Miles 24 420 Ships in 12 - 17 working days

In recent years rapid Internet growth has pushed the development of new multimedia applications in all aspects of life such as entertainment, communication, collaborative work and electronic commerce. Future applications will make use of different technologies like voice, data and video, but in order to make such a wide variety of multimedia applications successful, a number of technology and management issues must be addressed. Multimedia Networking: Technology, Management and Applications addresses the dynamic and efficient uses of resources a fundamental aspect of multimedia networks. Geared toward professionals, educators and students alike, this exciting new book will detail current research and the future direction of multimedia networking.

Distributed Video Sensor Networks (Hardcover, 2011 Ed.): Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid... Distributed Video Sensor Networks (Hardcover, 2011 Ed.)
Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid Aghajan, Demetri Terzopoulos
R4,553 R4,299 Discovery Miles 42 990 Save R254 (6%) Ships in 12 - 17 working days

Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research.

Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless video sensor networks, communications and control; embedded cameras and real-time video analysis; applications of distributed video networks; and educational opportunities and curriculum-development.

Topics and features: Presents an overview of research in areas of motion analysis, invariants, multiple cameras for detection, object tracking and recognition, and activities in video networks Provides real-world applications of distributed video networks, including force protection, wide area activities, port security, and recognition in night-time environments Describes the challenges in graphics and simulation, covering virtual vision, network security, human activities, cognitive architecture, and displays Examines issues of multimedia networks, registration, control of cameras (in simulations and real networks), localization and bounds on tracking Discusses system aspects of video networks, with chapters on providing testbed environments, data collection on activities, new integrated sensors for airborne sensors, face recognition, and building sentient spaces Investigates educational opportunities and curriculum development from the perspective of computer science and electrical engineering

This unique text will be of great interest to researchers and graduate students of computer vision and pattern recognition, computer graphics and simulation, image processing and embedded systems, and communications, networks and controls. The large number of example applications will also appeal to application engineers.

The Active Defender - Immersion in the Offensive Security Mindset (Paperback): Catherine J. Ullman The Active Defender - Immersion in the Offensive Security Mindset (Paperback)
Catherine J. Ullman
R572 R509 Discovery Miles 5 090 Save R63 (11%) Ships in 12 - 17 working days

Immerse yourself in the offensive security mindset to better defend against attacks In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect, Security, Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. The author immerses you in the hacker mindset and the offensive security culture to better prepare you to defend against threats of all kinds. You’ll also find: Explanations of what an Active Defender is and how that differs from traditional defense models Reasons why thinking like a hacker makes you a better defender Ways to begin your journey as an Active Defender and leverage the hacker mindset An insightful and original book representing a new and effective approach to cybersecurity, The Active Defender will be of significant benefit to information security professionals, system administrators, network administrators, and other tech professionals with an interest or stake in their organization’s information security.

Big Data Science & Analytics - A Hands-On Approach (Hardcover): Arshdeep Bahga, Vijay Madisetti Big Data Science & Analytics - A Hands-On Approach (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R1,677 R1,517 Discovery Miles 15 170 Save R160 (10%) Ships in 12 - 17 working days
Hands on Hacking (Paperback): M. Hickey Hands on Hacking (Paperback)
M. Hickey
R804 Discovery Miles 8 040 Ships in 12 - 17 working days

A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.

Medical Data Mining and Knowledge Discovery (Hardcover, 2001 ed.): Krzysztof J. Cios Medical Data Mining and Knowledge Discovery (Hardcover, 2001 ed.)
Krzysztof J. Cios
R5,732 Discovery Miles 57 320 Ships in 10 - 15 working days

Modern medicine generates, almost daily, huge amounts of heterogeneous data. For example, medical data may contain SPECT images, signals lik e ECG, clinical information like temperature, cholesterol levels, etc., as well as the physician's interpretation. Those who deal with such data understand that there is a widening gap between data collection a nd data comprehension. Computerized techniques are needed to help huma ns address this problem. This volume is devoted to the relatively youn g and growing field of medical data mining and knowledge discovery. As more and more medical procedures employ imaging as a preferred diagno stic tool, there is a need to develop methods for efficient mining in databases of images. Other significant features are security and confi dentiality concerns. Moreover, the physician's interpretation of image s, signals, or other technical data, is written in unstructured Englis h which is very difficult to mine. This book addresses all these speci fic features.

Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG... Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part III (Hardcover, 1st ed. 2021)
Alexandre Dolgui, Alain Bernard, David Lemoine, Gregor von Cieminski, David Romero
R4,319 Discovery Miles 43 190 Ships in 12 - 17 working days

The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.

AWS OpsWorks User Guide (Hardcover): Documentation Team AWS OpsWorks User Guide (Hardcover)
Documentation Team
R2,543 Discovery Miles 25 430 Ships in 10 - 15 working days
Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback): Peter Augustine, Pethuru Raj, Sathyan... Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback)
Peter Augustine, Pethuru Raj, Sathyan Munirathinam
R1,384 Discovery Miles 13 840 Ships in 12 - 17 working days

Digital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution. There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises. Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.

Performance Analysis of ATM Networks - IFIP TC6 WG6.3 / WG6.4 Fifth International Workshop on Performance Modelling and... Performance Analysis of ATM Networks - IFIP TC6 WG6.3 / WG6.4 Fifth International Workshop on Performance Modelling and Evaluation of ATM Networks July 21-23, 1997, Ilkley, UK (Hardcover, 2000 ed.)
Demetres D. Kouvatsos
R5,771 Discovery Miles 57 710 Ships in 10 - 15 working days

Over recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of Asynchronous Transfer Mode (ATM) networks. This book describes recent advances in ATM networks reflecting the state-of-the-art technology and research achievements worldwide. In addition, it provides a fundamental source of reference in the ATM field. Research topics discussed in detail include: Traffic Modelling and Characterisation; Routing; Switch and Multiplexer Models; Call Admission Control (CAC); Congestion Control; Resource Allocation; Quality of Service (QoS); Tools and Techniques. This volume contains recently extended refereed papers of the 5th International Workshop on Performance Modelling and Evaluation of ATM Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held in Ilkley, UK in July 1997. Performance Analysis of ATM Networks continues the tradition established by the first three IFIP volumes on the subject, and it is ideal for personnel in computer/communication industries as well as academic and research staff in computer science and electrical engineering.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Hardcover, 2002 ed.): Shambhu Upadhyaya,... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Hardcover, 2002 ed.)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,919 Discovery Miles 29 190 Ships in 10 - 15 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Consumer Trust in Electronic Commerce: Time for Best Practice - Time for Best Practice (Hardcover): Ronald De-Bruin Consumer Trust in Electronic Commerce: Time for Best Practice - Time for Best Practice (Hardcover)
Ronald De-Bruin
R5,530 Discovery Miles 55 300 Ships in 10 - 15 working days

This multi-disciplinary book provides insight in how to establish consumer trust in electronic commerce. It first goes into detail on a broad variety of consumer trust criteria with regard to the security and reliability of electronic consumer transactions, what information must be provided to consumers, how to create a legally binding contract online, confidence in electronic payments, the resolution of disputes, what law applies to the electronic consumer contract, which body is entitled to settle the dispute and personal data protection. By means of these criteria it is assessed into what extent consumer trust is ensured by the application of a public-key infrastructure, which supports cryptographic services such as electronic signatures and encryption. An assessment is also made on the European Union cryptography policy and the European Union policy on consumer protection in electronic commerce. In addition, a wide range of co-regulation and self-regulation initiatives within the European Union and Northern America are assessed. Finally, this book provides a consumer trust framework which learns that various ingredients at different levels are required to build consumer trust in electronic commerce. As such, it clarifies the roles and responsibilities of government, industry and consumer organisations, businesses, as well as consumers themselves.

The Future of FinTech - Integrating Finance and Technology in Financial Services (Hardcover, 1st ed. 2017): Bernardo Nicoletti The Future of FinTech - Integrating Finance and Technology in Financial Services (Hardcover, 1st ed. 2017)
Bernardo Nicoletti
R4,875 Discovery Miles 48 750 Ships in 12 - 17 working days

This book provides an introduction to the state of the art in financial technology (FinTech) and the current applications of FinTech in digital banking. It is a comprehensive guide to the various technologies, products, processes, and business models integral to the FinTech environment. Covering key definitions and characteristics, models and best practice, as well as presenting relevant case studies related to FinTech and e-Business, this book helps build a theoretical framework for future discussion.

Tourism Informatics - Visual Travel Recommender Systems, Social Communities, and User Interface Design (Hardcover, New): Nalin... Tourism Informatics - Visual Travel Recommender Systems, Social Communities, and User Interface Design (Hardcover, New)
Nalin Sharda
R4,760 Discovery Miles 47 600 Ships in 12 - 17 working days

Tourism is a multi-billion dollar international industry and also one of the biggest users of Web technologies, constantly adopting innovative ideas to enhance its market penetration. ""Tourism Informatics: Visual Travel Recommender Systems, Social Communities and User Interface Design"" provides cohesive coverage of cutting-edge e-tourism systems and directions for future research and development. A defining body of research, this innovative collection provides academicians, researchers, and practitioners with a better understanding of this expanding industry.

If It's Smart, It's Vulnerable (Hardcover): M Hypponen If It's Smart, It's Vulnerable (Hardcover)
M Hypponen
R504 Discovery Miles 5 040 Ships in 12 - 17 working days

Reimagine the future of the internet All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best--and worst--things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosec Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

Ontologies-Based Business Integration (Hardcover, 2008 ed.): Michael Rebstock Ontologies-Based Business Integration (Hardcover, 2008 ed.)
Michael Rebstock; Contributions by K.-D. Naujok; Fengel Janina; Contributions by C. Huemer; Heiko Paulheim; Contributions by …
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

The globalization of everyday business and increasing international trade lead to a growing need to improve national and international business collaborations and transactions. Upcoming new technologies for e-business transactions allow for new ways of process, information and application integration. But business partners almost always have different ways to systemize the information needed to run the business, in terms of information structure, syntax and semantics. Consequences are mismatch and misunderstanding in electronic transactions. This book shows what ontology management can do for process, information and application integration under dynamic e-business conditions. We not only discuss research results and develop novel methods and frameworks, but also apply them to build business use application components that are deployed as web services.

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover): Jinhui Zhang, Yuanqing Xia, Zhongqi... Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover)
Jinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen
R2,212 R1,865 Discovery Miles 18 650 Save R347 (16%) Ships in 9 - 15 working days

The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.

Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW... Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW '93 (Hardcover, 1993 ed.)
Giorgio De Michelis, Carla Simone, K. Schmidt
R5,647 Discovery Miles 56 470 Ships in 10 - 15 working days

Computer-Supported Cooperative Work (CSCW) is an interdisicplinary research area devoted to exploring the issues of designing computer-based systems that enhance the abilities of cooperating workers to coordinate and integrate their activities in an efficient, effective, and flexible manner. This rigorously selected volume represents both practical and theoretical approaches from many of the leading researchers in the field. As an interdisciplinary area of research, CSCW is characterized by bringing together widely disparate research traditions and perspectives into an arena of collaboration and contention. The selected papers reflect the diverse approaches and cultures of this multi-disciplinary field. This collection will be of interest to a wide audience - because of the huge practical import of the issues and because of the interdisciplinary nature of the problems and the solutions proposed. In particular, the volume will be of interest to researchers and professionals in computing, sociology, cognitive science, and human factors.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, … Hardcover R6,527 Discovery Miles 65 270
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Integration and Implementation of the…
Pradeep Tomar Hardcover R7,022 Discovery Miles 70 220
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Handbook of Research on Digital…
Ana Pego Hardcover R8,162 Discovery Miles 81 620
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,838 Discovery Miles 48 380
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,808 Discovery Miles 98 080

 

Partners