![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General
Discusses the requirements and establishment of a layered protocol architecture. Highlights the importance of cable media in getting a high-speed network. Covers the fundamental concepts and advanced topics such as metro ethernet, and ethernet first mile in the field of networking. Presents important topics such as multiprotocol label switching, cloud computing in networking, and the internet of things. Explores the necessity of software-defined networking and network functions virtualization.
Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
Based on the technical accumulation and practice of Huawei iLab in the Cloud VR field, this book systematically describes the advantages of Cloud VR technologies; technical requirements on clouds, networks, and terminals as well as solution implementation; Cloud VR experience evaluation baselines and methods; and current business practices. Cloud VR introduces cloud computing and cloud rendering to VR services. With fast and stable networks, cloud-based display output and audio output are coded, compressed, and transmitted to user terminals, implementing cloud-based VR service content and content rendering. Cloud VR has stringent requirements on bandwidth and latency, making it a proficient application for 5G and gigabit home broadband networks in the era of "dual G". As the first advocate of Cloud VR, Huawei iLab developed the first prototype of the Cloud VR technical solution, initiated the industry's first Cloud VR industry cooperation plan - VR OpenLab with partners - and incubated the world's first Cloud VR commercial project with China Mobile Fujian. Cloud VR: Technology and Application is the first official publication of Huawei iLab's research and practice achievements. It systematically and thoroughly introduces the Cloud VR concept, solution architecture, key technologies, and business practices and is of great value in academic and social applications. This book is easy to understand, practical, and suitable for VR vendors, VR technology enthusiasts, carriers, network vendors, cloud service providers, universities, and other enterprises and scientific research institutes.
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
This book presents the state-of-the-art and breakthrough innovations in design automation for cyber-physical systems.The authors discuss various aspects of cyber-physical systems design, including modeling, co-design, optimization, tools, formal methods, validation, verification, and case studies. Coverage includes a survey of the various existing cyber-physical systems functional design methodologies and related tools will provide the reader unique insights into the conceptual design of cyber-physical systems.
Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power - and the increasing significance of their disembodied counterparts - has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital 'offline' technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the return of data, knowledge, and power within a physical 'smart' world. This development frames the book's central question: can the law steer rematerialisation in a human-centric and socially just direction? To answer it, the book focuses on the IoT, the sociotechnological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against 'smart' capitalism.
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.
Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market
Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming - illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as biomed, genetics, finance, manufacturing, imaging, and more. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of Xeon-powered systems, but also how to leverage parallelism across these heterogeneous systems.
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Essential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.
Unique selling point: * Systematically introduces the basic knowledge and state-of-the-art on UDHNs Core audience: * Researchers, engineers and postgraduates working on UDHNs Place in the market: * Includes the latest case studies and applications
By the end of this book, the reader will understand: the difficulties of finding a needle in a haystack; creative solutions to address the problem; unique ways of engineering features and solving the problem of the lack of data (e.g. synthetic data). Additionally, the reader will be able to: avoid mistakes resulting from a lack of understanding; search for appropriate methods of feature engineering; locate the relevant technological solutions within the general context of decision-making.
This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
Given their tremendous success in commercial applications, machine learning (ML) models are increasingly being considered as alternatives to science-based models in many disciplines. Yet, these "black-box" ML models have found limited success due to their inability to work well in the presence of limited training data and generalize to unseen scenarios. As a result, there is a growing interest in the scientific community on creating a new generation of methods that integrate scientific knowledge in ML frameworks. This emerging field, called scientific knowledge-guided ML (KGML), seeks a distinct departure from existing "data-only" or "scientific knowledge-only" methods to use knowledge and data at an equal footing. Indeed, KGML involves diverse scientific and ML communities, where researchers and practitioners from various backgrounds and application domains are continually adding richness to the problem formulations and research methods in this emerging field. Knowledge Guided Machine Learning: Accelerating Discovery using Scientific Knowledge and Data provides an introduction to this rapidly growing field by discussing some of the common themes of research in KGML using illustrative examples, case studies, and reviews from diverse application domains and research communities as book chapters by leading researchers. KEY FEATURES First-of-its-kind book in an emerging area of research that is gaining widespread attention in the scientific and data science fields Accessible to a broad audience in data science and scientific and engineering fields Provides a coherent organizational structure to the problem formulations and research methods in the emerging field of KGML using illustrative examples from diverse application domains Contains chapters by leading researchers, which illustrate the cutting-edge research trends, opportunities, and challenges in KGML research from multiple perspectives Enables cross-pollination of KGML problem formulations and research methods across disciplines Highlights critical gaps that require further investigation by the broader community of researchers and practitioners to realize the full potential of KGML
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems
1) Provides a levelling approach, bringing students at all stages of programming experience to the same point 2) Focuses Python, a general language, to an engineering and scientific context 3) Uses a classroom tested, practical approach to teaching programming 4) Teaches students and professionals how to use Python to solve engineering calculations such as differential and algebraic equations |
You may like...
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald
Hardcover
R5,315
Discovery Miles 53 150
High-Performance Computing Using FPGAs
Wim Vanderbauwhede, Khaled Benkrid
Hardcover
R6,662
Discovery Miles 66 620
Novel Approaches to Information Systems…
Naveen Prakash, Deepika Prakash
Hardcover
R5,924
Discovery Miles 59 240
Agile Software Architecture - Aligning…
Muhammad Ali Babar, Alan W. Brown, …
Paperback
|