0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (23)
  • R500+ (2,620)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General

Information Technology and Organizations - Strategies, Networks, and Integration (Hardcover, New): Brian P. Bloomfield, Rod... Information Technology and Organizations - Strategies, Networks, and Integration (Hardcover, New)
Brian P. Bloomfield, Rod Coombs, David Knights, Dale Littler
R4,741 Discovery Miles 47 410 Ships in 10 - 15 working days

This book is concerned with the ways in which organizations design, build and use information technology systems. In particular it looks at the interaction between these IT-centred activities and the broader management processes within organizations. The authors adopt a critical social science perspective on these issues, and are primarily concerned with advancing theoretical debates on how best to understand the related processes of technological and organizational change. To this end, the book examines and deploys recent work on power/knowledge, actor-network theory and critical organization theory. The result is an account of the nature and significance of information systems in organizations which is an alternative perspective to pragmatic and recipe-based approaches to this topic which dominate much contemporary management literature on IT. This book is intended for academic: Management and social science academics and postgraduate students of IT strategy and organization. Practitioner: Senior managers concerned with IT and strategy issues.

Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020): Felipe Rocha... Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020)
Felipe Rocha da Rosa, Luciano Ost, Ricardo Reis
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book describes the benefits and drawbacks inherent in the use of virtual platforms (VPs) to perform fast and early soft error assessment of multicore systems. The authors show that VPs provide engineers with appropriate means to investigate new and more efficient fault injection and mitigation techniques. Coverage also includes the use of machine learning techniques (e.g., linear regression) to speed-up the soft error evaluation process by pinpointing parameters (e.g., architectural) with the most substantial impact on the software stack dependability. This book provides valuable information and insight through more than 3 million individual scenarios and 2 million simulation-hours. Further, this book explores machine learning techniques usage to navigate large fault injection datasets.

Energy-Efficient Smart Temperature Sensors in CMOS Technology (Hardcover, 1st ed. 2018): Kamran Souri, Kofi Makinwa Energy-Efficient Smart Temperature Sensors in CMOS Technology (Hardcover, 1st ed. 2018)
Kamran Souri, Kofi Makinwa
R3,851 Discovery Miles 38 510 Ships in 18 - 22 working days

This book describes the design and implementation of energy-efficient smart (digital output) temperature sensors in CMOS technology. To accomplish this, a new readout topology, namely the zoom-ADC, is presented. It combines a coarse SAR-ADC with a fine Sigma-Delta (SD) ADC. The digital result obtained from the coarse ADC is used to set the reference levels of the SD-ADC, thereby zooming its full-scale range into a small region around the input signal. This technique considerably reduces the SD-ADC's full-scale range, and notably relaxes the number of clock cycles needed for a given resolution, as well as the DC-gain and swing of the loop-filter. Both conversion time and power-efficiency can be improved, which results in a substantial improvement in energy-efficiency. Two BJT-based sensor prototypes based on 1st-order and 2nd-order zoom-ADCs are presented. They both achieve inaccuracies of less than +/-0.2 DegreesC over the military temperature range (-55 DegreesC to 125 DegreesC). A prototype capable of sensing temperatures up to 200 DegreesC is also presented. As an alternative to BJTs, sensors based on dynamic threshold MOSTs (DTMOSTs) are also presented. It is shown that DTMOSTs are capable of achieving low inaccuracy (+/-0.4 DegreesC over the military temperature range) as well as sub-1V operation, making them well suited for use in modern CMOS processes.

Reconfigurable and Adaptive Computing - Theory and Applications (Hardcover): Nadia Nedjah, Chao Wang Reconfigurable and Adaptive Computing - Theory and Applications (Hardcover)
Nadia Nedjah, Chao Wang
R6,044 Discovery Miles 60 440 Ships in 10 - 15 working days

Reconfigurable computing techniques and adaptive systems are some of the most promising architectures for microprocessors. Reconfigurable and Adaptive Computing: Theory and Applications explores the latest research activities on hardware architecture for reconfigurable and adaptive computing systems. The first section of the book covers reconfigurable systems. The book presents a software and hardware codesign flow for coarse-grained systems-on-chip, a video watermarking algorithm for the H.264 standard, a solution for regular expressions matching systems, and a novel field programmable gate array (FPGA)-based acceleration solution with MapReduce framework on multiple hardware accelerators. The second section discusses network-on-chip, including an implementation of a multiprocessor system-on-chip platform with shared memory access, end-to-end quality-of-service metrics modeling based on a multi-application environment in network-on-chip, and a 3D ant colony routing (3D-ACR) for network-on-chip with three different 3D topologies. The final section addresses the methodology of system codesign. The book introduces a new software-hardware codesign flow for embedded systems that models both processors and intellectual property cores as services. It also proposes an efficient algorithm for dependent task software-hardware codesign with the greedy partitioning and insert scheduling method (GPISM) by task graph.

Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations (Hardcover, 1st ed. 2018):... Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations (Hardcover, 1st ed. 2018)
Hideto Hidaka
R3,999 Discovery Miles 39 990 Ships in 10 - 15 working days

This book provides a comprehensive introduction to embedded flash memory, describing the history, current status, and future projections for technology, circuits, and systems applications. The authors describe current main-stream embedded flash technologies from floating-gate 1Tr, floating-gate with split-gate (1.5Tr), and 1Tr/1.5Tr SONOS flash technologies and their successful creation of various applications. Comparisons of these embedded flash technologies and future projections are also provided. The authors demonstrate a variety of embedded applications for auto-motive, smart-IC cards, and low-power, representing the leading-edge technology developments for eFlash. The discussion also includes insights into future prospects of application-driven non-volatile memory technology in the era of smart advanced automotive system, such as ADAS (Advanced Driver Assistance System) and IoE (Internet of Everything). Trials on technology convergence and future prospects of embedded non-volatile memory in the new memory hierarchy are also described. Introduces the history of embedded flash memory technology for micro-controller products and how embedded flash innovations developed; Includes comprehensive and detailed descriptions of current main-stream embedded flash memory technologies, sub-system designs and applications; Explains why embedded flash memory requirements are different from those of stand-alone flash memory and how to achieve specific goals with technology development and circuit designs; Describes a mature and stable floating-gate 1Tr cell technology imported from stand-alone flash memory products - that then introduces embedded-specific split-gate memory cell technologies based on floating-gate storage structure and charge-trapping SONOS technology and their eFlash sub-system designs; Describes automotive and smart-IC card applications requirements and achievements in advanced eFlash beyond 4 0nm node.

The Calculus of Computation - Decision Procedures with Applications to Verification (Hardcover, 2007 ed.): Aaron R. Bradley,... The Calculus of Computation - Decision Procedures with Applications to Verification (Hardcover, 2007 ed.)
Aaron R. Bradley, Zohar Manna
R2,072 Discovery Miles 20 720 Ships in 10 - 15 working days

Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art decision procedures for arithmetic, data structures, and combination theories. The textbook also presents a logical approach to engineering correct software. Verification exercises are given to develop the reader's facility in specifying and verifying software using logic. The treatment of verification concludes with an introduction to the static analysis of software, an important component of modern verification systems. The final chapter outlines courses of further study.

Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE... Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), Wuhan, China, December 24-25, 2014 (Hardcover)
Yuanzhi Wang
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China. The objective of this conference was to provide a forum for different researchers in different fields, especially Computer Education as well as Information Technology, to exchange their various findings. The papers have been grouped under the following overarching themes: Computer Science, Computer Education, Education and Teaching Reform, and Communication and Intelligent Control.

Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover): Jeffrey S. Vetter Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover)
Jeffrey S. Vetter
R3,364 Discovery Miles 33 640 Ships in 10 - 15 working days

HPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles. This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and: Presents highlights of applications, workloads, and benchmarks Describes hardware architectures, system software, and programming systems Explores storage, visualization, and analytics Examines the data center/facility as well as system statistics Featuring pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.

Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback)
Ilker OEzcelik, Richard Brooks
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Security Patterns in Practice - Designing Secure Architectures Using Software Patterns (Hardcover): E. E. Fernandez Security Patterns in Practice - Designing Secure Architectures Using Software Patterns (Hardcover)
E. E. Fernandez
R1,517 R1,227 Discovery Miles 12 270 Save R290 (19%) Ships in 10 - 15 working days

Learn to combine security theory and code to produce secure systems

Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides an extensive, up-to-date catalog of security patternsShares real-world case studies so you can see when and how to use security patterns in practiceDetails how to incorporate security from the conceptual stage Highlights tips on authentication, authorization, role-based access control, firewalls, wireless networks, middleware, VoIP, web services security, and moreAuthor is well known and highly respected in the field of security and an expert on security patterns

"Security Patterns in Practice" shows you how to confidently develop a secure system step by step.

Theory of Reversible Computing (Hardcover, 1st ed. 2017): Kenichi Morita Theory of Reversible Computing (Hardcover, 1st ed. 2017)
Kenichi Morita
R5,526 Discovery Miles 55 260 Ships in 10 - 15 working days

This book describes reversible computing from the standpoint of the theory of automata and computing. It investigates how reversibility can be effectively utilized in computing. A reversible computing system is a "backward deterministic" system such that every state of the system has at most one predecessor. Although its definition is very simple, it is closely related to physical reversibility, one of the fundamental microscopic laws of Nature. Authored by the leading scientist on the subject, this book serves as a valuable reference work for anyone working in reversible computation or in automata theory in general. This work deals with various reversible computing models at several different levels, which range from the microscopic to the macroscopic, and aims to clarify how computation can be carried out efficiently and elegantly in these reversible computing models. Because the construction methods are often unique and different from those in the traditional methods, these computing models as well as the design methods provide new insights for future computing systems. Organized bottom-up, the book starts with the lowest scale of reversible logic elements and circuits made from them. This is followed by reversible Turing machines, the most basic computationally universal machines, and some other types of reversible automata such as reversible multi-head automata and reversible counter machines. The text concludes with reversible cellular automata for massively parallel spatiotemporal computation. In order to help the reader have a clear understanding of each model, the presentations of all different models follow a similar pattern: the model is given in full detail, a short informal discussion is held on the role of different elements of the model, and an example with illustrations follows each model.

Efficient Lighting Applications and Case Studies (Hardcover, New): Scott C. Dunning, Albert. Thumann Efficient Lighting Applications and Case Studies (Hardcover, New)
Scott C. Dunning, Albert. Thumann
R3,369 Discovery Miles 33 690 Ships in 10 - 15 working days

With the increased concern for energy conservation in recent years, much attention has been focused on lighting energy consumption and methods for reducing it. Along with this concern for energy efficient lighting has come the realization that lighting has profound effects on worker productivity as well as important aesthetic qualities. This book presents an introduction to lighting design and energy efficiency which can be utilized while maintaining the quality of illumination. Topics include lighting energy management, selection of lamps, task lighting, lighting design, lighting control, reflectors, ballast selection, natural daylighting, wireless lighting control, and case studies.

Identification and Management of Distributed Data - NGN, Content-Centric Networks and the Web (Hardcover): Giovanni Bartolomeo,... Identification and Management of Distributed Data - NGN, Content-Centric Networks and the Web (Hardcover)
Giovanni Bartolomeo, Tatiana Kovacikova
R2,813 Discovery Miles 28 130 Ships in 10 - 15 working days

Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management.
With a focus on the primary problems in identifying, addressing, and managing information in a distributed environment, the book guides you through the discovery of distributed data management on the web, in next-generation networks (NGNs), and in new content-centric networking paradigms. It includes case studies from the Palo Alto Research Center and the Semantic Web Education and Outreach Interest Group that illustrate the convergence between software engineering and networking technologies.
Derived from academic courses, ongoing research, and the latest standardization initiatives, the book explains how the various layers of the existing Internet protocol stack already provide most of the functions that information engineers need to design efficient systems. Although the subject is broad, the book provides helpful insights into a number of critical technologies to provide you with the foundation required to build and deploy more efficient data interoperability paradigms in next-generation networks.

Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Hardcover, 1st ed.... Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Hardcover, 1st ed. 2018)
Basel Halak
R2,795 Discovery Miles 27 950 Ships in 10 - 15 working days

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.

Introduction to Digital Systems Design (Hardcover, 1st ed. 2019): Giuliano Donzellini, Luca Oneto, Domenico Ponta, Davide... Introduction to Digital Systems Design (Hardcover, 1st ed. 2019)
Giuliano Donzellini, Luca Oneto, Domenico Ponta, Davide Anguita
R2,525 Discovery Miles 25 250 Ships in 18 - 22 working days

This book has been designed for a first course on digital design for engineering and computer science students. It offers an extensive introduction on fundamental theories, from Boolean algebra and binary arithmetic to sequential networks and finite state machines, together with the essential tools to design and simulate systems composed of a controller and a datapath. The numerous worked examples and solved exercises allow a better understanding and more effective learning. All of the examples and exercises can be run on the Deeds software, freely available online on a webpage developed and maintained by the authors. Thanks to the learning-by-doing approach and the plentiful examples, no prior knowledge in electronics of programming is required. Moreover, the book can be adapted to different level of education, with different targets and depth, be used for self-study, and even independently from the simulator. The book draws on the authors' extensive experience in teaching and developing learning materials.

Logic Synthesis for FSM-Based Control Units (Hardcover, 2010 ed.): Alexander Barkalov, Larysa Titarenko Logic Synthesis for FSM-Based Control Units (Hardcover, 2010 ed.)
Alexander Barkalov, Larysa Titarenko
R4,145 Discovery Miles 41 450 Ships in 18 - 22 working days

Tremendous achievements in the area of semiconductor electronics turn - croelectronics into nanoelectronics. Actually, we observe a real technical boom connected with achievements in nanoelectronics. It results in devel- mentofverycomplexintegratedcircuits, particularlythe?eldprogrammable logic devices (FPLD). Up-to-day FPLD chips are so huge, that it is enough only one chip to implement a really complex digital system including a da- path and a control unit. Because of the extreme complexity of modern - crochips, it is very important to develop e?ective design methods oriented on particular properties of logic elements. The development of digital s- tems with use of FPLD microchips is not possible without use of di?erent hardware description languages(HDL), such as VHDL and Verilog. Di?erent computer-aided design tools (CAD) are wide used to develop digital system hardware. As majorityof researchespoint out, the design processis nowvery similar to the process of program development. It allows a researcher to pay more attention to some speci?c problems, where there are no standard f- mal methods of their solution. But application of all these achievements does not guaranteeper sedevelopmentof some competitiveelectronic product, - pecially in the acceptable time-to-market. This problem solution is possible only if a researcher possesses fundamental knowledge of a design process and knows exactly the mode of operation of industrial CAD tools in use. As it is known, any digital system can be represented as a composition of a da- path and a control uni

Good Code, Bad Code: Think like a software engineer (Paperback): Tom Long Good Code, Bad Code: Think like a software engineer (Paperback)
Tom Long
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

"Helps explain some of the knowledge gaps between enthusiastic new graduates and grouchy old gray beards like myself." - Joe Ivans Practical techniques for writing code that is robust, reliable, and easy for team members to understand and adapt. Good code or bad code? The difference often comes down to how you apply the conventions, style guides, and other established practices of the software development community. In Good Code, Bad Code you'll learn how to boost your effectiveness and productivity with code development insights normally only learned through years of experience, careful mentorship, and hundreds of code reviews. In Good Code, Bad Code you'll learn how to: - Think about code like an effective software engineer - Write functions that read like a well-structured sentence - Ensure code is reliable and bug free - Effectively unit test code - Identify code that can cause problems and improve it - Write code that is reusable and adaptable to new requirements - Improve your medium and long-term productivity - Save you and your team's time about the technology Coding in a development team requires very different skills to working on personal projects. Successful software engineers need to ensure that their code is reusable, maintainable, and easy for others to understand and adapt. about the book Good Code, Bad Code is a shortcut guide to writing high-quality code. Your mentor is Google veteran Tom Long, who lays out lessons and mindsets that will take your code from "junior developer" to "senior engineer." This instantly-useful book distils the principles of professional coding into one comprehensive and hands-on beginner's guide. You'll start with a jargon-free primer to coding fundamentals that teaches you to think about abstractions, consider your fellow engineers, and write code that can recover from errors. Next, you'll dive into specific techniques and practices. You'll run through common coding practices to learn when to apply the right technique to your problem-and which might be best avoided! All practices are illustrated with annotated code samples written in an instantly recognizable pseudocode that you can relate to your favourite object-oriented language. By the time you're done, you'll be writing the kind of readable, reusable, and testable code that's the mark of a true software professional. about the reader For coders looking to improve their experience in professional software development. about the author Tom Long is a software engineer at Google. He works as a tech lead, mentoring and teaching professional coding practices to new graduates and beginner software engineers.

The Architecture of Information - Architecture, Interaction Design and the Patterning of Digital Information (Paperback):... The Architecture of Information - Architecture, Interaction Design and the Patterning of Digital Information (Paperback)
Martyn Dade-Robertson
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This book looks at relationships between the organisation of physical objects in space and the organisation of ideas. Historical, philosophical, psychological and architectural knowledge are united to develop an understanding of the relationship between information and its representation. Despite its potential to break the mould, digital information has relied on metaphors from a pre-digital era. In particular, architectural ideas have pervaded discussions of digital information, from the urbanisation of cyberspace in science fiction, through to the adoption of spatial visualisations in the design of graphical user interfaces. This book tackles: * the historical importance of physical places to the organisation and expression of knowledge * the limitations of using the physical organisation of objects as the basis for systems of categorisation and taxonomy * the emergence of digital technologies and the 20th century new conceptual understandings of knowledge and its organisation * the concept of disconnecting storage of information objects from their presentation and retrieval * ideas surrounding semantic space' * the realities of the types of user interface which now dominate modern computing.

Optical Communication Systems - Limits and Possibilities (Hardcover): Andrew Ellis, Mariia Sorokina Optical Communication Systems - Limits and Possibilities (Hardcover)
Andrew Ellis, Mariia Sorokina
R3,405 Discovery Miles 34 050 Ships in 10 - 15 working days

Telecommunications have underpinned social interaction and economic activity since the 19th century and have been increasingly reliant on optical fibers since their initial commercial deployment by BT in 1983. Today, mobile phone networks, data centers, and broadband services that facilitate our entertainment, commerce, and increasingly health provision are built on hidden optical fiber networks. However, recently it emerged that the fiber network is beginning to fill up, leading to the talk of a capacity crunch where the capacity still grows but struggles to keep up with the increasing demand. This book, featuring contributions by the suppliers of widely deployed simulation software and academic authors, illustrates the origins of the limited performance of an optical fiber from the engineering, physics, and information theoretic viewpoints. Solutions are then discussed by pioneers in each of the respective fields, with near-term solutions discussed by industrially based authors, and more speculative high-potential solutions discussed by leading academic groups.

Heterogeneous System Architecture - A New Compute Platform Infrastructure (Paperback): Wen-Mei W. Hwu Heterogeneous System Architecture - A New Compute Platform Infrastructure (Paperback)
Wen-Mei W. Hwu
R1,133 Discovery Miles 11 330 Ships in 10 - 15 working days

Heterogeneous Systems Architecture - a new compute platform infrastructure presents a next-generation hardware platform, and associated software, that allows processors of different types to work efficiently and cooperatively in shared memory from a single source program. HSA also defines a virtual ISA for parallel routines or kernels, which is vendor and ISA independent thus enabling single source programs to execute across any HSA compliant heterogeneous processer from those used in smartphones to supercomputers. The book begins with an overview of the evolution of heterogeneous parallel processing, associated problems, and how they are overcome with HSA. Later chapters provide a deeper perspective on topics such as the runtime, memory model, queuing, context switching, the architected queuing language, simulators, and tool chains. Finally, three real world examples are presented, which provide an early demonstration of how HSA can deliver significantly higher performance thru C++ based applications. Contributing authors are HSA Foundation members who are experts from both academia and industry. Some of these distinguished authors are listed here in alphabetical order: Yeh-Ching Chung, Benedict R. Gaster, Juan Gomez-Luna, Derek Hower, Lee Howes, Shih-Hao HungThomas B. Jablin, David Kaeli,Phil Rogers, Ben Sander, I-Jui (Ray) Sung.

Programming Massively Parallel Processors - A Hands-on Approach (Paperback, 4th edition): Wen-Mei W. Hwu, David B. Kirk, Izzat... Programming Massively Parallel Processors - A Hands-on Approach (Paperback, 4th edition)
Wen-Mei W. Hwu, David B. Kirk, Izzat El Hajj
R1,926 Discovery Miles 19 260 Ships in 10 - 15 working days

Programming Massively Parallel Processors: A Hands-on Approach shows both student and professional alike the basic concepts of parallel programming and GPU architecture. Various techniques for constructing parallel programs are explored in detail. Case studies demonstrate the development process, which begins with computational thinking and ends with effective and efficient parallel programs. Topics of performance, floating-point format, parallel patterns, and dynamic parallelism are covered in depth. For this new edition, the authors are updating their coverage of CUDA, including the concept of unified memory, and expanding content in areas such as threads, while still retaining its concise, intuitive, practical approach based on years of road-testing in the authors' own parallel computing courses.

The Method Framework for Engineering System Architectures (Hardcover, New): Donald G. Firesmith, Peter Capell, Dietrich... The Method Framework for Engineering System Architectures (Hardcover, New)
Donald G. Firesmith, Peter Capell, Dietrich Falkenthal, Charles B. Hammons, DeWitt T. Latimer IV, …
R3,972 Discovery Miles 39 720 Ships in 10 - 15 working days

The architects of today s large and complex systems all too often struggle with the lack of a consistent set of principles and practices that adequately address the entire breadth of systems architecture. The Method Framework for Engineering System Architectures (MFESA) enables system architects and process engineers to create methods for effectively and efficiently engineering high-quality architecture for systems, subsystems, and software components.

Meets the Needs of Specific Projects

The book begins by documenting the common challenges that must be addressed by system architecture engineering. It explores the major principles answering these challenges and forming the basis of MFESA. Next, the authors introduce MFESA, including its primary goals, inputs, tasks, outputs, and assumptions. Then they describe the fundamental concepts and terminology on which the systems architecture engineering is founded. This is followed by a description of each of the ten system architecture engineering tasks including associated goals and objectives, preconditions, inputs, steps, postconditions, work products, guidelines, and pitfalls.

Finally, the book documents the relationship between quality and architecture, explains the quality model underlying MFESA, and provides a summary of MFESA method framework, as well as a list of points to remember and future directions planned for MFESA.

Explains Specific Rationales

Organized as a handy desk reference, this book harnesses more than 100 years of the authors combined professional experience to provide extensive guidelines, best practices, and tips on avoiding possible pitfalls. It presents a direct rationale of why steps are taken, how things can go wrong, and guidance for how and when to tailor the model for a system s specific context.

CRC Press is pleased to announce that The Method Framework for Engineering System Architectures has been added to "Intel Corporation s Recommended Reading List." Intel s Recommended Reading program provides technical professionals a simple and handy reference list of what to read to stay abreast of new technologies. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list. This is the most comprehensive reading list available for professional computer developers.

Programmable Logic Controllers (Paperback, 6th edition): William Bolton Programmable Logic Controllers (Paperback, 6th edition)
William Bolton 1
R1,404 R1,228 Discovery Miles 12 280 Save R176 (13%) Ships in 10 - 15 working days

This textbook, now in its sixth edition, continues to be straightforward and easy-to-read, presenting the principles of PLCs while not tying itself to one manufacturer or another. Extensive examples and chapter ending problems utilize several popular PLCs, highlighting understanding of fundamentals that can be used regardless of manufacturer. This book will help you to understand the main design characteristics, internal architecture, and operating principles of PLCs, as well as Identify safety issues and methods for fault diagnosis, testing, and debugging. New to This edition: A new chapter 1 with a comparison of relay-controlled systems, microprocessor-controlled systems, and the programmable logic controller, a discussion of PLC hardware and architecture, examples from various PLC manufacturers, and coverage of security, the IEC programming standard, programming devices and manufacturer's software More detail of programming using Sequential Function Charts Extended coverage of the sequencer More Information on fault finding, including testing inputs and outputs with an illustration of how it is done with the PLC manufacturer's software New case studies

A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition)
Bongsik Shin
R1,200 R1,133 Discovery Miles 11 330 Save R67 (6%) Ships with 15 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective.

Because of the critical importance of cybersecurity in today’s enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading.

This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter.

FEATURES

Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity

Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP

Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice

Explains subjects in a systematic and practical manner to facilitate understanding

Includes practical exercise questions that can be individual or group assignments within or without a classroom

Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning

The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Table of Contents

1. Networking: Fundamental Concepts

2. Cybersecurity: Fundamentals

3. Essential Layers of Computer Networking

4. IP Address Planning and Management

5. Intermediary Devices

6. Wi-Fi and Cellular Network

7. Ethernet LAN

8. Cybersecurity: Threats

9. Cybersecurity: Network and Host Protection

10. Cybersecurity: Data Protection

11. Fundamentals of Packet Routing

12. Wide Area Network

13. Physical Layer Data Transmissions

Verifiable Autonomous Systems - Using Rational Agents to Provide Assurance about Decisions Made by Machines (Hardcover): Louise... Verifiable Autonomous Systems - Using Rational Agents to Provide Assurance about Decisions Made by Machines (Hardcover)
Louise A. Dennis, Michael Fisher
R2,042 Discovery Miles 20 420 Ships in 10 - 15 working days

How can we provide guarantees of behaviours for autonomous systems such as driverless cars? This tutorial text, for professionals, researchers and graduate students, explains how autonomous systems, from intelligent robots to driverless cars, can be programmed in ways that make them amenable to formal verification. The authors review specific definitions, applications and the unique future potential of autonomous systems, along with their impact on safer decisions and ethical behaviour. Topics discussed include the use of rational cognitive agent programming from the Beliefs-Desires-Intentions paradigm to control autonomous systems and the role model-checking in verifying the properties of this decision-making component. Several case studies concerning both the verification of autonomous systems and extensions to the framework beyond the model-checking of agent decision-makers are included, along with complete tutorials for the use of the freely-available verifiable cognitive agent toolkit Gwendolen, written in Java.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Thinking Machines - Machine Learning and…
Shigeyuki Takano Paperback R2,011 Discovery Miles 20 110
The Physics of Computing
Marilyn Wolf Paperback R1,645 Discovery Miles 16 450
Heterogeneous Computing - Hardware and…
Mohamed Zahran Hardcover R1,517 Discovery Miles 15 170
Novel Approaches to Information Systems…
Naveen Prakash, Deepika Prakash Hardcover R5,924 Discovery Miles 59 240
Advances in Intelligent Systems…
Sergey Yurish Hardcover R2,453 Discovery Miles 24 530
Clean Architecture - A Craftsman's Guide…
Robert Martin Paperback  (1)
R860 R741 Discovery Miles 7 410
High-Performance Computing Using FPGAs
Wim Vanderbauwhede, Khaled Benkrid Hardcover R6,662 Discovery Miles 66 620
Advancements in Instrumentation and…
Srijan Bhattacharya Hardcover R6,138 Discovery Miles 61 380
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810
Conceptual Spaces: Elaborations and…
Mauri Kaipainen, Frank Zenker, … Hardcover R3,112 Discovery Miles 31 120

 

Partners