![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General
Unique selling point: * Systematically introduces the basic knowledge and state-of-the-art on UDHNs Core audience: * Researchers, engineers and postgraduates working on UDHNs Place in the market: * Includes the latest case studies and applications
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
This book is structured as a step-by-step course of study along the lines of a VLSI integrated circuit design project. The entire Verilog language is presented, from the basics to everything necessary for synthesis of an entire 70,000 transistor, full-duplex serializer-deserializer, including synthesizable PLLs. The author includes everything an engineer needs for in-depth understanding of the Verilog language: Syntax, synthesis semantics, simulation and test. Complete solutions for the 27 labs are provided in the downloadable files that accompany the book. For readers with access to appropriate electronic design tools, all solutions can be developed, simulated, and synthesized as described in the book. A partial list of design topics includes design partitioning, hierarchy decomposition, safe coding styles, back annotation, wrapper modules, concurrency, race conditions, assertion-based verification, clock synchronization, and design for test. A concluding presentation of special topics includes System Verilog and Verilog-AMS.
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems
The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today's Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles.
This book describes simple to complex ASIC design practical scenarios using Verilog. It builds a story from the basic fundamentals of ASIC designs to advanced RTL design concepts using Verilog. Looking at current trends of miniaturization, the contents provide practical information on the issues in ASIC design and synthesis using Synopsys DC and their solution. The book explains how to write efficient RTL using Verilog and how to improve design performance. It also covers architecture design strategies, multiple clock domain designs, low-power design techniques, DFT, pre-layout STA and the overall ASIC design flow with case studies. The contents of this book will be useful to practicing hardware engineers, students, and hobbyists looking to learn about ASIC design and synthesis.
Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.
Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data's full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems' workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems' energy consumption, reliability, resource utilization, cost, and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets, this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design, management, and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure.
Covering both the fundamentals and the in-depth topics related to Verilog digital design, both students and experts can benefit from reading this book by gaining a comprehensive understanding of how modern electronic products are designed and implemented. Principles of Verilog Digital Design contains many hands-on examples accompanied by RTL codes that together can bring a beginner into the digital design realm without needing too much background in the subject area. This book has a particular focus on how to transform design concepts into physical implementations using architecture and timing diagrams. Common mistakes a beginner or even an experienced engineer can make are summarized and addressed as well. Beyond the legal details of Verilog codes, the book additionally presents what uses Verilog codes have through some pertinent design principles. Moreover, students reading this book will gain knowledge about system-level design concepts. Several ASIC designs are illustrated in detail as well. In addition to design principles and skills, modern design methodology and how it is carried out in practice today are explored in depth as well.
Essential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
1) Provides a levelling approach, bringing students at all stages of programming experience to the same point 2) Focuses Python, a general language, to an engineering and scientific context 3) Uses a classroom tested, practical approach to teaching programming 4) Teaches students and professionals how to use Python to solve engineering calculations such as differential and algebraic equations
Given their tremendous success in commercial applications, machine learning (ML) models are increasingly being considered as alternatives to science-based models in many disciplines. Yet, these "black-box" ML models have found limited success due to their inability to work well in the presence of limited training data and generalize to unseen scenarios. As a result, there is a growing interest in the scientific community on creating a new generation of methods that integrate scientific knowledge in ML frameworks. This emerging field, called scientific knowledge-guided ML (KGML), seeks a distinct departure from existing "data-only" or "scientific knowledge-only" methods to use knowledge and data at an equal footing. Indeed, KGML involves diverse scientific and ML communities, where researchers and practitioners from various backgrounds and application domains are continually adding richness to the problem formulations and research methods in this emerging field. Knowledge Guided Machine Learning: Accelerating Discovery using Scientific Knowledge and Data provides an introduction to this rapidly growing field by discussing some of the common themes of research in KGML using illustrative examples, case studies, and reviews from diverse application domains and research communities as book chapters by leading researchers. KEY FEATURES First-of-its-kind book in an emerging area of research that is gaining widespread attention in the scientific and data science fields Accessible to a broad audience in data science and scientific and engineering fields Provides a coherent organizational structure to the problem formulations and research methods in the emerging field of KGML using illustrative examples from diverse application domains Contains chapters by leading researchers, which illustrate the cutting-edge research trends, opportunities, and challenges in KGML research from multiple perspectives Enables cross-pollination of KGML problem formulations and research methods across disciplines Highlights critical gaps that require further investigation by the broader community of researchers and practitioners to realize the full potential of KGML
- Curating Social Data - Summarizing Social Data - Analyzing Social Data - Social Data Analytics Applications: Trust, Recommender Systems, Cognitive Analytics |
You may like...
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues
Paperback
R4,669
Discovery Miles 46 690
Novel Approaches to Information Systems…
Naveen Prakash, Deepika Prakash
Hardcover
R5,924
Discovery Miles 59 240
|