![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.
The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. So far as optical networking is concerned, WDM (Wavelength Division Multiplexing) appears as the main advance in the transmission area, because it allows transmission rates near to the theoretical limit of optical fibers, of the order of dozens of terabits a second [1]. An essential issue in optical network design is defining how the network will be controlled, that is, what type of signalling will be responsible for resource reservation, route determination and fault handling, among other functions that constitute the control plane. Label switching, which in IP networks is exemplified by MPLS (Multiprotocol Label Switching) [2], was extended through GMPLS (Generalized Multiprotocol Label Switching) [3] to operate with several different network technologies, where the label can be represented in other ways, for example, as time-slots in TDM networks, as physical switch ports and as wavelengths (lambdas) in WDM networks.
"In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches. Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments proposes a vast panorama of research on the topic while presenting a variety of viewpoints, approaches, and indications of the shared elements intended as the foundations of an emerging and fascinating multidisciplinary field."
This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing. Responding to instructor and student survey input, the authors have streamlined chapters and examples. The Fifth Edition: Has a new chapter on feature interaction testing that explores the feature interaction problem and explains how to reduce tests Uses Java instead of pseudo-code for all examples including structured and object-oriented ones Presents model-based development and provides an explanation of how to conduct testing within model-based development environments Explains testing in waterfall, iterative, and agile software development projects Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing Thoroughly revised and updated, Software Testing: A Craftsman's Approach, Fifth Edition is sure to become a standard reference for those who need to stay up to date with evolving technologies in software testing.
A major, comprehensive professional text/reference for designing and maintaining security and reliability.
Cases on Telecommunications and Networking presents a wide range of the most current issues related to the planning, design, maintenance, and management of telecommunications and networking technologies and applications in organizations. Real-life cases included in this publication clearly illustrate challenges and solutions associated with the effective utilization and management of telecommunications and networking technologies in modern organizations worldwide. ""Cases on Telecommunications and Networking"" provides practitioners, educators, and students with important examples of successes and failures in telecommunications and networking systems implementation. This publication is instrumental for those learning about the issues and challenges in the field of telecommunications and networking systems.
In the last years, knowledge and learning management have made a significant impact on the IT research community. ""Open Source for Knowledge and Learning Management: Strategies Beyond Tools"" presents learning and knowledge management from a point of view where the basic tools and applications are provided by open source technologies. ""Open Source for Knowledge and Learning Management: Strategies Beyond Tools"" explains an intense orientation to the critical issues of the open source paradigm: open source tools, applications, social networks, and knowledge sharing in open source communities. Open source technologies, tools, and applications are analyzed in the context of knowledge and learning, and this convergence formulates a challenging landscape for the deployment of information technology.
Data Communication Principles for Fixed and Wireless Networks
focuses on the physical and data link layers. Included are examples
that apply to a diversified range of higher level protocols such as
TCP/IP, OSI and packet based wireless networks. Performance
modeling is introduced for beginners requiring basic mathematics.
Separate discussion has been included on wireless cellular networks
performance and on the simulation of networks. Throughout the book,
wireless LANS has been given the same level of treatment as fixed
network protocols. It is assumed that readers would be familiar
with basic mathematics and have some knowledge of binary number
systems.
Approaches to legal ontologies constitutes a collective reflection on the foundations of legal ontology engineering, by exploring current methodologies and theoretical approaches to defining legal ontologies, their divergences and complementarity and the challenges still to be faced. It gathers contributions from leading experts regarding their theoretical commitments and methodological approaches derived from a long experience in the area and presents a mature reflection on achievements and current shortcomings. The various authors reconstruct their concrete methodological frameworks by retrieving the more or less explicit theoretical choices that have guided their work on legal ontology engineering over the last years. This results in the presentation of apparently opposed but in fact complementary rationales for ontology building in the legal domain (legal-theoretical, sociolegal, philosophical, among others) that address the various dimensions of legal knowledge and its conceptual modelling. The book provides the reader with a unique source regarding the current theoretical landscape in legal ontology engineering as well as on foreseeable future trends for the definition of conceptual structures to enhance the automatic processing and retrieval of legal information in the Semantic Web framework. It will thus interest researchers in the domains of the SW, legal informatics, Artificial Intelligence and law, legal theory and legal philosophy, as well as developers of e-government applications based on the intelligent management of legal or public information to provide both back-office and front-office support.
Handling IPv6 for the first time is a challenging task even for the experienced system administrator. New concepts and mechanisms make it necessary to rethink well-established methods of the IPv4 protocol. This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily any IPv6 knowledge. It focuses on reliable and efficient operation of IPv6 implementations available today rather than on protocol specifications. Consequently, it covers the essential concepts - using instructive and thoroughly tested examples - on how to configure, to administrate, and to debug IPv6 setups. These foundations are complemented by discussions of best practices and strategic considerations aimed at overall efficiency, reliability, maintainability, and interoperation. The examples in this book cover all relevant aspects concerning Debian GNU/Linux, FreeBSD, and Solaris. Examples about other Unix derivatives are available online at www.benedikt-stockebrand.de.
Many organizations, whether in the public or private sector, have begun to take advantage of the tools and techniques used for data mining. Utilizing data mining tools, these organizations are able to reveal the hidden and unknown information from available data. Data Mining in Dynamic Social Networks and Fuzzy Systems brings together research on the latest trends and patterns of data mining tools and techniques in dynamic social networks and fuzzy systems. With these improved modern techniques of data mining, this publication aims to provide insight and support to researchers and professionals concerned with the management of expertise, knowledge, information, and organizational development.
This book contains everything you need to make your application
program support IPv6. IPv6 socket APIs (RFC2553) are fully
described with real-world examples. It covers security, a great
concern these days. To secure the Internet infrastructure, every
developer has to take a security stance - to audit every line of
code, to use proper API and write correct and secure code as much
as possible. To achieve this goal, the examples presented in this
book are implemented with a security stance. Also, the book leads
you to write secure programs. For instance, the book recommends
against the use of some of the IPv6 standard APIs - unfortunately,
there are some IPv6 APIs that are inherently insecure, so the book
tries to avoid (and discourage) the use of such APIs. Another key
issue is portability. The examples in the book should be applicable
to any of UNIX based operating systems, MacOS X, and Windows XP.
This work surveys the various switching technologies, shows how to evaluate the performance of ATM networks and enables the reader to implement teletraffic control via connection admission control (CAC) and other traffic control methods. The text introduces the non-parametric approach for CAC and dimensioning and offers the hybrid CAC as an alternative solution to traffic control.
This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today's information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.
Peer-to-peer computing has gained significant attention from both industry and research communities in the past decade as the number of users worldwide continues to grow along with demand for mobile computing. Mobile Peer-to-Peer Computing for Next Generation Distributed Environments: Advancing Conceptual and Algorithmic Applications focuses on current research and innovation in mobile and wireless technologies that address challenges from both a theoretical and applied perspective. This advanced publication provides researchers, practitioners, and academicians with an authoritative reference source to the latest state-of-the-art developments in this growing technology field.
A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.
The book is a reference book for research and graduate studies. The purpose of the book is to expose researchers and graduate students to state-of-the-art advances in cross-layer design for wireless ad hoc and sensor networks. In particular, the book will explore the optimization potential of cross-layer design approaches for wireless ad hoc and sensor network performance. The book will consist of two main parts: a theoretical section that provides an overview of design issues in both strictly layered and cross-layer approaches for ad hoc and sensor networks; and a practical section that builds on these issues to explore three case studies of diverse ad hoc and sensor network applications and communication technologies.
Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.
During the last two decades we have seen a tremendous development within the computer and communication industry. The ever increasing density on silicon, the increasing transmission speeds on fiber based systems as well as twisted pairs, the revolutionary development in the wireless area and of course the Internet have all led to many opportunities for new service developments. It is interesting to note that the last time this conference was held three years ago, the Web really did not fully exist. We are now ready to face new interesting challenges. It is an utmost importance for the performance community to focus on the modeling and analysis of the Internet, the multimedia applications and the untethered applications that are coming to the forefront. There will be a need for new and better simulation methods, new analytical tools and a much better understanding of measurement techniques. "Performance of Information and Communication Systems," PICS'98, which takes place in Lund, Sweden, May 25-28, 1998, is the seventh conference in a series on performance of communication systems organized by IFIP TC 6, WG 6.3. In response to our call for papers, we have received nearly fifty submissions.
This book constitutes the refereed proceedings of the 8th International Conference on Human Choice and Computers (HCC8), IFIP TC9, held in Pretoria, South Africa on September 25-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The purpose of network performance analysis is to investigate how traffic-management mechanisms deployed in the network affect the allocation of resources amongst its users and the performance they experience. This topic can be studied by the construction of models of traffic management mechanisms and observing how they perform by applying them to some flow of network traffic. This useful volume introduces concepts and principles of network performance analysis by example, using the J programming language. J is rich in mathematical functionality, which makes it an ideal tool for analytical methods. The book favours a practical approach and develops functions in J to demonstrate mathematical concepts, thereby enabling readers to explore the underlying principles behind network performance analysis. In addition, this allows the subject to become more accessible to those who, although have a mathematical background, are not pure mathematicians. Topics and features: a [ Uses an example-driven approach to introduce the fundamentals of network performance analysis a [ Provides a concise introduction to the J programming language a [ Presents network calculus as a method for designing and engineering networks a [ Focuses on statistical analysis and stochastic processes a [ Demonstrates how to simulate traffic with both short-range and long-range dependence properties a [ Covers ATM QoS, and examines Internet congestion control Network Performance Analysis will equally appeal to network professionals and postgraduates studying the topic by providing valuable analytical tools and using J as a means of offering a practical treatment of the subject. Dr. Holthas a broad range of industry experience and now regularly lectures on this topic.
Testing of Communicating Systems presents the latest world-wide results in both theory and practice. This volume provides a forum in which the substantial volume of research on the testing of communicating systems, spanning from conformance testing through interoperability testing, to performance and QoS testing, is brought together. The following topics are discussed in detail: Types of testing; Phases of the testing process; Classes of systems to be tested; and Theory and practice of testing. This book contains the selected proceedings of the 11th International Workshop on the Testing of Communicating Systems, formerly the International Workshop on Protocol Test Systems, sponsored by the International Federation for Information Processing (IFIP), and held in Tomsk, Russia, in August/September 1998. Testing of Communicating Systems will be essential reading for engineers, IT managers and research personnel working in computer sciences and telecommunications.
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
With the continual growth in telecommunication services in today's multimedia environment, reliability and control are essential elements in the provision of services. This book addresses the need for an integration of service and management in multimedia networks in order to facilitate greater accuracy and quality in the services provided. The book aims to disseminate all facets of network and service management in broadband networks and multimedia services while providing an overview of state-of-the-art research and implementation experiences in the field. |
You may like...
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,370
Discovery Miles 53 700
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
|