Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections:
Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms.
Since the early eighteenth century, the theory of networks and graphs has matured into an indispensable tool for describing countless real-world phenomena. However, the study of large-scale features of a network often requires unrealistic limits, such as taking the network size to infinity or assuming a continuum. These asymptotic and analytic approaches can significantly diverge from real or simulated networks when applied at the finite scales of real-world applications. This book offers an approach to overcoming these limitations by introducing operator graph theory, an exact, non-asymptotic set of tools combining graph theory with operator calculus. The book is intended for mathematicians, physicists, and other scientists interested in discrete finite systems and their graph-theoretical description, and in delineating the abstract algebraic structures that characterise such systems. All the necessary background on graph theory and operator calculus is included for readers to understand the potential applications of operator graph theory.
For the past decade, e-mail has been the preferred method of internal communication in libraries. However, relying on email for organizational knowledge management seems a bit like storing birth certificates, car titles, and deeds in a pile of junk mail: the important documents are lost amongst other items of only minimal or fleeting importance. A successful intranet can provide a secure place for information exchange and storage; however, in order to be successful, a library intranet must be easy to use, have the functionality desired by its users, and be integrated into the daily workflows of all library staff. Accomplishing this can be challenging for web librarians. The book covers, among other topics, third-party hosting; the use of freely available blog and wiki software for internal staff communication; and developing library intranets in ColdFusion, Microsoft SharePoint, and the open source Drupal content management system (CMS). More importantly, the authors examine in detail the human factors, which, when not thoroughly addressed, are more often the cause for a failed intranet than the technology platform. This book was published as a special issue of the Journal of Web Librarianship.
Wollen Sie ein Netzwerk einrichten? Einem Kollegen Ihre Dateien auf einfache Art zugAnglich machen? Den Drucker gemeinsam mit der ganzen Familie nutzen? Alle Mitarbeiter auf die Kundendatenbank zugreifen lassen? Dieses Buch hilft Ihnen bei der Installation, Konfiguration und Administration Ihres ersten Netzwerks, ganz egal, ob Sie zu Hause ein Heimnetzwerk einrichten oder beruflich als Systemadministrator einsteigen wollen. KlAren Sie zunAchst ein paar grundsAtzliche Fragen: LAN oder WLAN? Welches Betriebssystem? Und dann geht es ran ans Netz: den Drucker ins Netz bringen, Benutzerkonten einrichten, den Mail- und Web-Server konfigurieren. Und natA1/4rlich geht das Buch auch auf Cloud Computing, die Integration mobiler GerAte, Netzwerksicherheit und virtuelle Maschinen ein.
This reference text discusses advances in wireless communication, design challenges, and future research directions to design reliable wireless communication. The text discusses emerging technologies including wireless sensor networks, Internet of Things (IoT), cloud computing, mm-Wave, Massive MIMO, cognitive radios (CR), visible light communication (VLC), wireless optical communication, signal processing, and channel modeling. The text covers artificial intelligence-based applications in wireless communication, machine learning techniques and challenges in wireless sensor networks, and deep learning for channel and bandwidth estimation during optical wireless communication. The text will be useful for senior undergraduate, graduate students, and professionals in the fields of electrical engineering, and electronics and communication engineering.
Addressing the growth of IP telephony service offerings within the corporate and residential realm, IP Telephony Interconnection Reference: Challenges, Models, and Engineering examines the technical and regulatory issues related to IP telephony interconnection at the large scale. It describes business and interconnection models, reviews emerging architectures such as IMS and TISPAN, identifies commonly-encountered issues, and supplies solutions to technical issues. The authors offer a detailed overview of SPEERMINT activity and proposed architecture, the current work undertaken in i3 Forum, and the use of ENUM for interconnection-describing practices in both fixed and mobile networks. Among the first books to present information on interprovider communications and interconnection of IP telephony clouds, the text supplies a clear and up-to-date picture of the VoIP protocol jungle. Provides detailed guidance on how to implement VoIP interconnect services Presents an overview of deployed architectures in fixed and mobile networks used for interconnection and roaming purposes Enumerates regulatory issues with a focus on Europe and the United States Proposes interconnection models Suggests viable solutions to technical issues This reference supplies an overview of interconnection practices in PSTN/mobile. It proposes solutions for overcoming service engineering issues and includes a set of recommendations to ease the proliferation of interconnection agreements and schemes. Keeping you up to speed with recent developments in IP telephony, the book facilitates the understanding of the technical and regulatory requirements needed to provide global services to your customers and successfully navigate the upcoming migration to a completely IP-based model.
The Emerald Handbook of ICT in Tourism and Hospitality examines the immense, widespread and ongoing changes that digital technologies are having on the tourism and hospitality industries globally. An international range of contributors present key research findings, in-depth case studies and discussion of the future implications stemming from technologies changes and developments across a number of core themes effecting these industries, including destination promotion, marketing contexts, service promotion and smart city involvement. Chapters explore new developments on a wide range of contemporary issues, including: * ICT, sustainable development and implications for the tourism industry * the role of mobile technology for tourism development * influencer marketing for tourism and hospitality * online tracking * factors influencing Generation Y tourism choices * cross country cases of ICT application in tourism and hospitality. The Emerald Handbook of ICT in Tourism and Hospitality is aimed primarily at global tourism academics and researchers, however graduate students of tourism and academics will also find this book to be of interest.
While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges provides comprehensive theoretical and practical coverage of the major features of contemporary P2P systems and examines the obstacles to further success. Setting the stage for understanding important research issues in P2P systems, the book first introduces various P2P network architectures. It then details the topology control research problem as well as existing technologies for handling topology control issues. The author describes novel and interesting incentive schemes for enticing peers to cooperate and explores recent innovations on trust issues. He also examines security problems in a P2P network. The final chapter addresses the future of the field. Throughout the text, the highly popular P2P IPTV application, PPLive, is used as a case study to illustrate the practical aspects of the concepts covered. Addressing the unique challenges of P2P systems, this book presents practical applications of recent theoretical results in P2P computing. It also stimulates further research on critical issues, including performance and security problems.
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
Although recent global disasters have clearly demonstrated the power of social media to communicate critical information in real-time, its true potential has yet to be unleashed. Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies teaches emergency management professionals how to use social media to improve emergency planning, preparedness, and response capabilities. It provides a set of guidelines and safe practices for using social media effectively across a range of emergency management applications. Explaining how emergency management agencies can take advantage of the extended reach these technologies offer, the book supplies cutting-edge methods for leveraging these technologies to manage information more efficiently, reduce information overload, inform the public, and ultimately save lives. Filled with real-world examples and case studies, it is an ideal self-study resource. Its easy-to-navigate structure and numerous exercises also make it suitable for courses at both the undergraduate and graduate levels. From crowdsourcing and digital volunteers to mapping and collective intelligence, Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies facilitates a clear understanding of the essential principles of social media. Each chapter includes an example of a local-level practitioner, organization, or agency using social media that demonstrates the transformative power of social media in the real world. The book also includes numerous exercises that supply readers with models for building their own social media sites and groups-making it a must-read for anyone who wants to learn more about the communication and information structures supported by social media. Visit the author's homepage: http://sites.google.com/site/conniemwhite/Home
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics. Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including: More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements 60,000 test questions, including for Certified Ethical Hacking and CISSP (R) 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labs Rounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats. Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com.
In an era of intense competition where plant operating efficiencies must be maximized, downtime due to machinery failure has become more costly. To cut operating costs and increase revenues, industries have an urgent need to predict fault progression and remaining lifespan of industrial machines, processes, and systems. An engineer who mounts an acoustic sensor onto a spindle motor wants to know when the ball bearings will wear out without having to halt the ongoing milling processes. A scientist working on sensor networks wants to know which sensors are redundant and can be pruned off to save operational and computational overheads. These scenarios illustrate a need for new and unified perspectives in system analysis and design for engineering applications. Intelligent Diagnosis and Prognosis of Industrial Networked Systems proposes linear mathematical tool sets that can be applied to realistic engineering systems. The book offers an overview of the fundamentals of vectors, matrices, and linear systems theory required for intelligent diagnosis and prognosis of industrial networked systems. Building on this theory, it then develops automated mathematical machineries and formal decision software tools for real-world applications. The book includes portable tool sets for many industrial applications, including:
The book also proposes future directions for intelligent diagnosis and prognosis in energy-efficient manufacturing, life cycle assessment, and systems of systems architecture. Written in a concise and accessible style, it presents tools that are mathematically rigorous but not involved. Bridging academia, research, and industry, this reference supplies the know-how for engineers and managers making decisions about equipment maintenance, as well as researchers and students in the field.
The essential roadmaps for enterprise cloud adoption As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization. This book will help you: Discover how the cloud can fulfill major business needs Adopt a standardized Cloud Adoption Framework and understand the key dimensions of cloud adoption and digital transformation Learn how cloud adoption impacts culture, architecture, security, and more Understand the roles of governance, methodology, and how the cloud impacts key players in your organization. Providing a collection of winning plays, championship advice, and real-world examples of successful adoption, this playbook is your ultimate resource for making the cloud work. There has never been a better time to adopt the cloud. Cloud solutions are more numerous and accessible than ever before, and evolving technology is making the cloud more reliable, more secure, and more necessary than ever before. Don't let your organization be left behind! The Cloud Adoption Playbook gives you the essential guidance you need to make the smart choices that reduce your organizational risk and accelerate your cloud adoption and digital transformation.
From small start-ups to major corporations, companies of all sizes have embraced cloud computing for the scalability, reliability, and cost benefits it can provide. It has even been said that cloud computing may have a greater effect on our lives than the PC and dot-com revolutions combined. Filled with comparative charts and decision trees, Implementing and Developing Cloud Computing Applications explains exactly what it takes to build robust and highly scalable cloud computing applications in any organization. Covering the major commercial offerings currently available, it provides authoritative guidance through the implementation process. It puts cloud computing into historical context and considers how cloud computing affects project management, budgeting, and lifecycle management in your organization. It also explains how to: * Choose the best combination of platforms, tools, and services * Develop new cloud applications from scratch * Migrate legacy software * Prevent lock-in to a single vendor * Estimate costs and benefits * Address reliability, availability, and security concerns * Use interclouding, Cloud Brokers, and other techniques for safely deploying in public, private, and hybrid clouds * Take advantage of the latest developments, including OpenStack From software and testing tools to best practices and service providers, this book considers the entire cloud application environment. It details the platforms currently available, tools that facilitate development, as well as the costs involved. Designed specifically for software developers and their managers, this complete resource includes case studies that illustrate the latest cloud computing technologies, implementation issues, and recently developed solutions. It also provides access to a blog to help keep you current on the latest developments in cloud computing.
Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields-from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers. Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure of time dissemination, distribution, and synchronization-specifically the architecture, protocols, and algorithms of the NTP. This system has been active in one form or another for almost three decades on the Internet and numerous private networks on the nether side of firewalls. Just about everything today that can be connected to a network wire has support for NTP. This book: Describes the principal components of an NTP client and how it works with redundant servers and diverse network paths Provides an in-depth description of cryptographic and other critical algorithms Presents an overview of the engineering principles guiding network configuration Evaluating historic events that have taken place since computer network timekeeping started almost three decades ago, the author details a number of systems and drivers for current radio, satellites, and telephone modem dissemination and explains how we reckon the time, according to the stars and atoms. The original 16 chapters of the first edition have been rewritten, updated, and enhanced with new material. Four new chapters cover new algorithms and previously uncovered concepts, including timekeeping in space missions. Praise for the first edition: "... For those that need an exhaustive tome on all of the minutiae related to NTP and synchronization, this is the source. ... definitive ... this book should be considered the last word on the topic." -Ben Rothke on Slashdot.org "... the bible of the subject... contains enough information to take you just as far as you want to go....Dr. Mills is the original developer of NTP." -Books On-Line
The book introduces the concept of cloud manufacturing and describes the cloud service technology system behind it. The authors discuss key technologies of manufacturing cloud service management, including service construction, evaluation and composition, and scheduling. With abundant case studies, the book is an essential reference for researchers and engineers in manufacturing and information management.
Telecommunications have underpinned social interaction and economic activity since the 19th century and have been increasingly reliant on optical fibers since their initial commercial deployment by BT in 1983. Today, mobile phone networks, data centers, and broadband services that facilitate our entertainment, commerce, and increasingly health provision are built on hidden optical fiber networks. However, recently it emerged that the fiber network is beginning to fill up, leading to the talk of a capacity crunch where the capacity still grows but struggles to keep up with the increasing demand. This book, featuring contributions by the suppliers of widely deployed simulation software and academic authors, illustrates the origins of the limited performance of an optical fiber from the engineering, physics, and information theoretic viewpoints. Solutions are then discussed by pioneers in each of the respective fields, with near-term solutions discussed by industrially based authors, and more speculative high-potential solutions discussed by leading academic groups.
Whether you re already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services. From basic concepts and recent research findings to future directions, it gathers the insight of 50 experts from around to present a global perspective on the range of technical topics related to cloud computing and Software as a Service (SaaS). The book also: Reviews real cases and applications of cloud computing Witten in a manner that makes this complex subject easy to understand, this is an ideal one-stop reference for anyone interested in cloud computing. The accessible language and wealth of illustrations also make it suitable for academic and research-oriented settings. The comprehensive coverage supplies you with the understanding of cloud computing technologies and trends in parallel computing needed to establish and maintain effective and efficient computing and software services. Praise for: a must for professionals and executives as each chapter is
contributed by a team of highly accomplished and acclaimed
researchers, pundits, and professors.
In this fully updated and new edition, you'll get hands-on practice with the basics, including setting up cloud-based virtual machines, deploying web servers, and using hosted data stores. As you work through the book's 21 carefully planned lessons, you'll explore big-picture concerns like security, scaling, and automation. Learn Azure in a Month of Lunches, Second Edition teaches you the most important skills you'll need to write, deploy, and run cloud-based applications in Azure. Key Features * Understand Azure beyond point-and-click processes * Getting started, from your first login * Writing and deploying web servers * Securing your applications and dana * Automating your environment Readers should be able to write and deploy simple web or client/server applications. About the technology With hundreds of features and prebuilt services, the Microsoft Azure cloud platform is vast and powerful. To get started, you need a trustworthy guide. In this hands-on book, Microsoft engineer and Azure trainer Iain Foulds focuses on the core skills you need to create and maintain cloud-based applications. Iain Foulds is an engineer and senior content developer with Microsoft.
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud computing is answering the demand for sophisticated, flexible services Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center looks at cloud computing from an IT manager s perspective. It answers basic as well as strategic questions from both a business and a technical perspective so that you can confidently engage both IT and financial assets in making your organization techno- savvy, efficient, and competitive. Any answers about the future of computing are definitely in the cloud The first section of the book offers up a history of the computing roots that have evolved into cloud computing. It looks at how IT has been traditionally serving needs and how cloud computing improves and expands on these services, so you can strategize about how a cloud might provide solutions to specific IT questions or answer business needs. Next, the book shows how to begin the process of determining which organizational needs would best be served and improved by cloud computing. Presenting specific cases as examples, the book walks you through issues that your organization might likely encounter. Written clearly and succinctly, it --
By the book s conclusion, you will have a solid basis on which to initiate strategic discussions about deploying clouds in your organization. You will understand how cloud computing can affordably solve real problems. You will know which strategies to use and you will learn of the pitfalls to avoid when taking your data center to the clouds. Throughout this book are the answers you need to the many questions from the most basic to the more advanced surrounding cloud computing and its place in your enterprise. What exactly is cloud computing? Covering the basics of virtualization and clusters and the more advanced strategic considerations of security and return on investment, this book will be your guide to IT s present and future in the cloud, a resource that you will continually turn to. Coming soon For more information, Professional Cloud Computing, at www.professionalcloudcomputing.com, will help you find information to delve more deeply into the discussion in any of a number of directions.
This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2020, held in Salt Lake City, UT, USA, in October 2020.*The 16 full papers included in this volume were carefully reviewed and selected from the 38 papers (out of 74 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
"A valuable, practical guide for navigating through ICT turbulence and dynamics. A lighthouse for the human side of ICT." Erik van de Loo, Director Executive Masters in Change, INSEAD Professor of Organisational Behaviour, INSEAD Business School "The ICT Malaise is a different and thorough point of view on the dysfunctional approach the world has taken to information and technology. In an era of exponential changes where humans are rendered obsolete at the same pace of technology, it is fundamental to go back to basics on why we lead and innovate in the first place." Silvio Rugolo, VP, Global Sales, BMC Software, Digital Service Operations We hurtle ahead with technology, apps, and the newest innovation in a world that already demands a constant online presence and availability. You are included if you quickly adapt the newest technology and excluded if you wait too long. Information and communication technology (ICT) service providers, suppliers, and customers all try to make sense and make the most money out of technology developments and constant innovation with the help of frameworks, methodologies, best-practice approaches, and models. They continuously improve, align, integrate, and optimize, but unfortunately do not apply the same drive to safeguarding quality. This book leads the reader along a path of critical thinking, reflecting, and contemplating while offering alternative ways for service providers, customers, and suppliers to interact with each other. In addition, it encourages them to conduct their business in such a way that customers, service providers, and suppliers achieve satisfaction. The author implies a different mindset, a new way of interacting and a surprising approach to the many frameworks, models, and methodologies being introduced ceaselessly. While reading this book, IT professionals receive practical guidelines for using these newfound methodologies and models to help build and maintain healthy business relations while ensuring quality delivery of products and services. Readers will be surprised by how much more satisfying and less stressful their work environment becomes!
Marxist discourse around automation has recently become waylaid with breathless techno-pessimist dystopias and fanciful imaginations of automated luxury communism. This collection of essays by both established veterans of the field and new voices is a refreshingly sober materialist reflection on recent technological developments within capitalist production. It covers a broad range of digital aspects now proliferating across our work and lives, including chapters on the digitalisation of agriculture, robotics in the factory and the labour process on crowdworking platforms. It looks to how 20th century Marxist predictions of the 'workerless factory' are, or are not, coming true, and how 'Platform Capitalism' should be understood and critiqued. Through rich empirical, theoretical and historical material, this book is necessary reading for those wanting a clear overview of our digital world. |
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Introduction to Networking Basics
Patrick Ciccarelli, Christina Faulkner, …
Paperback
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
|