0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (37)
  • R500+ (308)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Personal computers > General

Ubiquitous Computing Systems - Third International Symposium, UCS 2006, Seoul, Korea, October 11-13, 2006, Proceedings... Ubiquitous Computing Systems - Third International Symposium, UCS 2006, Seoul, Korea, October 11-13, 2006, Proceedings (Paperback, 2006 ed.)
Hee Yong Youn, Minkoo Kim, Hiroyuki Morikawa
R1,832 Discovery Miles 18 320 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Computing Systems, UCS 2006, held in Seoul, Korea in October 2006. The 41 revised full papers presented were carefully reviewed and selected from 359 submissions. The papers are organized in topical sections on human computer interaction modeling and social aspects systems communications, as well as smart devices and security.

Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Xi'an, China, August 15-17,... Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings (Paperback, 2006 ed.)
Xiuzhen Cheng, Wei Li, Taieb Znati
R3,334 Discovery Miles 33 340 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2006, held in Xi'an, China in August 2006. The book presents 63 revised full papers together with 2 invited keynote speech abstracts, organized in topical sections on wireless PAN and wireless LAN, wireless MAN and pervasive computing, data management, mobility, localization and topology control, performance modeling and analysis, security and more.

Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul,... Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings (Paperback, 2006 ed.)
Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, …
R4,723 Discovery Miles 47 230 Ships in 10 - 15 working days

Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006.

The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).

Embedded and Ubiquitous Computing - International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings (Paperback,... Embedded and Ubiquitous Computing - International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings (Paperback, 2006 ed.)
Edwin Sha, Sung-Kook Han, Cheng Zhong Xu, Moon Hae Kim, Laurence T. Yang, …
R5,157 Discovery Miles 51 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Embedded and Ubiquitous Computing, EUC 2006, held in Seoul, Korea in August 2006.

The 113 revised full papers presented together with 3 keynote articles were carefully reviewed and selected from over 500 submissions. The papers are organized in topical sections on power aware computing, security and fault tolerance, agent and distributed computing, wireless communications, real-time systems, embedded software optimization, embedded systems, multimedia and data management, mobile computing, embedded system design automation, embedded architectures, network protocols, middleware and P2P.

Location- and Context-Awareness - Second International Workshop, LoCA 2006, Dublin, Ireland, May 10-11, 2006, Proceedings... Location- and Context-Awareness - Second International Workshop, LoCA 2006, Dublin, Ireland, May 10-11, 2006, Proceedings (Paperback, 2006 ed.)
Mike Hazas, John Krumm, Thomas Strang
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Location- and Context-Awareness, LoCA 2006, held in Dublin, Ireland, in May 2006. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 74 submissions. The papers are organized in topical sections on location sensing, mapping, privacy and access, context sensing, social context, representation and programming.

Pervasive Computing - 4th International Conference, PERVASIVE 2006, Dublin, Ireland, May 7-10, 2006, Proceedings (Paperback,... Pervasive Computing - 4th International Conference, PERVASIVE 2006, Dublin, Ireland, May 7-10, 2006, Proceedings (Paperback, 2006 ed.)
Kenneth P. Fishkin, Bernt Schiele, Paddy Nixon, Aaron Quigley
R1,736 Discovery Miles 17 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, held in Dublin, Ireland, in May 2006. The 24 revised full papers presented here are organized in topical sections on activity recognition, location, sensors, sensor processing and platforms, toolkits and gaming, security, pointing, interaction and displays, and smart homes, and beyond.

Vintage Laptop Computers - First Decade: 1980-89 (Paperback): James E. Wilson Vintage Laptop Computers - First Decade: 1980-89 (Paperback)
James E. Wilson
R406 R356 Discovery Miles 3 560 Save R50 (12%) Ships in 10 - 15 working days

The "Man"and his Machines I hope this book will refresh the memories of the few who were lucky enough to use "laptops" in the early years. Also to spark an interest in a machine which changed the way we live and do business today. I believe this book will be an invaluable aid in furnishing the information required to start a very challenging pursuit of vintage "Laptop" Computers. This could be a fascinating venture which would connect you to our life-changing technological history.

Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New): Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New)
R2,658 Discovery Miles 26 580 Ships in 10 - 15 working days

Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

From Specification to Embedded Systems Application (Hardcover, 2005 ed.): Achim Rettberg, Mauro C. Zanella, Franz J. Rammig From Specification to Embedded Systems Application (Hardcover, 2005 ed.)
Achim Rettberg, Mauro C. Zanella, Franz J. Rammig
R3,164 Discovery Miles 31 640 Ships in 10 - 15 working days

As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase.

Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations.

To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality.

From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP).

The topics which have been chosen for this working conference are very timely: design methodology, modeling, specification, software synthesis, power management, formal verification, testing, network, communication systems, distributed control systems, resource management and special aspects in system design.

UML for SOC Design (Hardcover, 2005 ed.): Grant Martin, Wolfgang Muller UML for SOC Design (Hardcover, 2005 ed.)
Grant Martin, Wolfgang Muller
R3,132 Discovery Miles 31 320 Ships in 10 - 15 working days

A tutorial approach to using the UML modeling language in system-on-chip design

Based on the DAC 2004 tutorial, applicable for students and professionals

Contributions by top-level international researchers

The best work at the first UML for SoC workshop

Unique combination of both UML capabilities and SoC design issues

Condenses research and development ideas that are only found in multiple conference proceedings and many other books into one place

Will be the seminal reference work for this area for years to come

Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 - 3rd International Conference on... Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 - 3rd International Conference on Human-Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings (Paperback, 2005 ed.)
Shinji Shimojo, Shingo Ichii, Tok Wang Ling, Kwan-Ho Song
R1,719 Discovery Miles 17 190 Ships in 10 - 15 working days

The Internet has now become an integral part of everyday life for hundreds of millions of people around the world. The uses of the Internet have augmented commerce, communication, education, governance, entertainment, health care, etc. E-mail has become an indispensable part of life; the Web has become an indispensable source of information on just about everything; people now use governmentWebsitestoreceiveinstructionsandinformation, and?lepaperwork with the government; many major online businesses have been created, such as Amazon, eBay, Google, Travelocity, eTrade, etc. However, the uses of the Internet have also had serious negative e?ects, - cluding spam, the spreading of viruses and worms, spyware, phishing, hacking, online fraud, invasions of privacy, etc. Viruses and worms often bring down tens of millions of computers around the world; many people get duped into furni- ing their personal identi?cations, and bank and insurance account information, etc.; hackers break into government and corporation computers to steal cri- cal data; unsubstantiated rumors about individuals or organizations spread like wild?re on the Internet, etc. Further, the uses of the Internet are creating new paradigms in areas such as copyright, governance, etc. The widespread use of peer-to-peer ?le sharing systems, started by Napster, is forcing a reassessment of the value of holding copyright on digital media. Internet postings by vocal citizens to the Web sites of the news media, governmento?ces, and elected g- ernment o?cials are impacting government policies and swaying the opinions of other citizens. The aim of the International Conference on Human

Clock Generators for SOC Processors - Circuits and Architectures (Hardcover): Amr Fahim Clock Generators for SOC Processors - Circuits and Architectures (Hardcover)
Amr Fahim
R2,978 Discovery Miles 29 780 Ships in 10 - 15 working days

This book examines the issue of design of fully-integrated frequency synthesizers suitable for system-on-a-chip (SOC) processors. This book takes a more global design perspective in jointly examining the design space at the circuit level as well as at the architectural level. The coverage of the book is comprehensive and includes summary chapters on circuit theory as well as feedback control theory relevant to the operation of phase locked loops (PLLs). On the circuit level, the discussion includes low-voltage analog design in deep submicron digital CMOS processes, effects of supply noise, substrate noise, as well device noise. On the architectural level, the discussion includes PLL analysis using continuous-time as well as discrete-time models, linear and nonlinear effects of PLL performance, and detailed analysis of locking behavior.

The material then develops into detailed circuit and architectural analysis of specific clock generation blocks. This includes circuits and architectures of PLLs with high power supply noise immunity and digital PLL architectures where the loop filter is digitized.

Methods of generating low-spurious sampling clocks for discrete-time analog blocks are then examined. This includes sigma-delta fractional-N PLLs, Direct Digital Synthesis (DDS) techniques and non-conventional uses of PLLs. Design for test (DFT) issues as they arise in PLLs are then discussed. This includes methods of accurately measuring jitter and built-in-self-test (BIST) techniques for PLLs. Finally, clocking issues commonly associated to system-on-a-chip (SOC) designs, such as multiple clock domain interfacing and partitioning, and accurate clock phase generation techniques usingdelay-locked loops (DLLs) are also addressed. The book provides numerous real world applications, as well as practical rules-of-thumb for modern designers to use at the system, architectural, as well as the circuit level. This book is well suited for practitioners as well as graduate level students who wish to learn more about time-domain analysis and design of frequency synthesis techniques.

Universal Access in Health Telematics - A Design Code of Practice (Paperback, 2005 ed.): Constantine Stephanidis Universal Access in Health Telematics - A Design Code of Practice (Paperback, 2005 ed.)
Constantine Stephanidis
R1,679 Discovery Miles 16 790 Ships in 10 - 15 working days

The Information Society is bringing about radical changes in the way people work and interact with each other and with information. In contrast to previous information processing paradigms, where the vast majority of computer-mediated tasks were business-oriented and executed by office workers using the personal computer in its various forms (i. e. , initially alphanumeric terminals and later on graphical user interfaces), the Information Society signifies a growth not only in the range and scope of the tasks, but also in the way in which they are carried out and experienced. To address the resulting dimensions of diversity, the notion of universal access is critically important. Universal access implies the accessibility and usability of Information Society technologies by anyone, anywhere, anytime. Universal access aims to enable equitable access and active participation of potentially all citizens in existing and emerging computer-mediated human activities by developing universally accessible and usable products and services, which are capable of accommodating individual user requirements in different contexts of use and independently of location, target machine, or run-time environment. In the context of the emerging Information Society, universal access becomes predominantly an issue of design, pointing to the compelling need for devising systematic and cost-effective approaches to designing systems that accommodate the requirements of the widest possible range of end-users. Recent developments have emphasized the need to consolidate progress by means of establishing a common vocabulary and a code of design practice, which addresses the specific challenges posed by universal access.

Location- and Context-Awareness - First International Workshop, LoCA 2005, Oberpfaffenhofen, Germany, May 12-13, 2005,... Location- and Context-Awareness - First International Workshop, LoCA 2005, Oberpfaffenhofen, Germany, May 12-13, 2005, Proceedings (Paperback, 2005 ed.)
Thomas Strang, Claudia Linnhoff-Popien
R1,719 Discovery Miles 17 190 Ships in 10 - 15 working days

Context-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context retrieval approaches are key p- requisites in any context-aware system. Location is one of the primary aspects of all major context models - together with time, identity and activity. From the technical side, sensing, fusing and distributing location and other context information is as important as providing context-awareness to applications and services in pervasive systems. Thematerialsummarizedinthisvolumewasselectedforthe1stInternational Workshop on Location- and Context-Awareness (LoCA 2005) held in coope- tion with the 3rd International Conference on Pervasive Computing 2005. The workshop was organized by the Institute of Communications and Navigation of the German Aerospace Center (DLR) in Oberpfa?enhofen, and the Mobile and Distributed Systems Group of the University of Munich. During the workshop, novel positioning algorithms and location sensing te- niques were discussed, comprising not only enhancements of singular systems, like positioning in GSM or WLAN, but also hybrid technologies, such as the integration of global satellite systems with inertial positioning. Furthermore, - provements in sensor technology, as well as the integration and fusion of sensors, were addressed both on a theoretical and on an implementation level. Personal and con?dential data, such as location data of users, have p- found implications for personal information privacy. Thus privacy protection, privacy-oriented location-aware systems, and how privacy a?ects the feasibility and usefulness of systems were also addressed in the workshop.

Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005,... Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings (Paperback, 2005 ed.)
Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."

From Computer Literacy to Informatics Fundamentals - International Conference on Informatics in Secondary Schools -- Evolution... From Computer Literacy to Informatics Fundamentals - International Conference on Informatics in Secondary Schools -- Evolution and Perspectives, ISSEP 2005, Klagenfurt, Austria, March 30-April 1, 2005, Proceedings (Paperback, 2005 ed.)
Roland T. Mittermeir
R1,607 Discovery Miles 16 070 Ships in 10 - 15 working days

Twenty years ago, informatics was introduced as a compulsory subject in A- trian secondary schools. During this period informatics has experienced drastic evolutions and even some shifts of paradigms. This applies to an even larger extent to the didactics of informatics. ISSEP-InformaticsinSecondarySchools,EvolutionandPerspectives-takes stock of how the developments in the ?eld are re?ected in school throughout Europe. Teachersofinformaticsatsecondaryschoolsaswellaseducatorsofsuch teachers propose innovative methods of instruction, discuss the scope of overall informaticsinstruction,anddiscusshowinnovativeconceptscanbedisseminated to students in education as well as to active informatics teachers. Duetothepenetrationofinformationtechnologyintosocietyatlargeandinto schools in particular, the relationship between informatics and education leading togeneralcomputerliteracyortotheuseofIT-basedapproachesinconventional subjects, e-learning in school, is an evident focus of many contributions. According to the broad scope of the conference its proceedings are split into two volumes. This volume, From Computer Literacy to Informatics Fundam- tals, covers papers reporting on national strategies of informatics instruction and their evolution in accordance with the penetration of information proce- ing equipment in our daily life. In one way or another, these strategies strive to accommodate the needs of basic skills in information and communication te- nology (ICT) with educational principles that can be conveyed by informatics instruction in a traditional sense. Hence, the papers on national strategies are complementedintwoways:?rstly,bycontributionsthatstrivetoidentifyfun- mental issues, informatics can contribute to the general education process of the youth; and, secondly, by papers presenting approaches on how to link or even to combine instruction about such informatics fundamentals with the need to introduce pupils to the productive use of ICT.

Astronomy with a Home Computer (Paperback, 2005 ed.): Neale Monks Astronomy with a Home Computer (Paperback, 2005 ed.)
Neale Monks
R803 R678 Discovery Miles 6 780 Save R125 (16%) Ships in 10 - 15 working days

Here is a one-volume guide to just about everything computer-related for amateur astronomers

Today's amateur astronomy is inextricably linked to personal computers. Computer-controlled "go-to" telescopes are inexpensive. CCD and webcam imaging make intensive use of the technology for capturing and processing images. Planetarium software provides information and an easy interface for telescopes. The Internet offers links to other astronomers, information, and software. The list goes on and on.

Find out here how to choose the best planetarium program: are commercial versions really better than freeware? Learn how to optimise a go-to telescope, or connect it to a lap-top. Discover how to choose the best webcam and use it with your telescope. Create a mosaic of the Moon, or high-resolution images of the planets...

Astronomy with a Home Computer is designed for every amateur astronomer who owns a home computer, whether it is running Microsoft Windows, Mac O/S or Linux. It doesn't matter what kind of telescope you own either - a small refractor is just as useful as a big "go-to" SCT for most of the projects in this book.

The PC Doctor's Fix It Yourself Guide (Paperback, Ed): Adrian Kingsley-Hughes The PC Doctor's Fix It Yourself Guide (Paperback, Ed)
Adrian Kingsley-Hughes
R1,086 R889 Discovery Miles 8 890 Save R197 (18%) Ships in 10 - 15 working days

Keep your PC in tip-top shape with the PC Doctors proven treatments.

Diagnose, fix, upgrade, and maintain your PC and install software and peripherals with help from this easy-to-use guide. Inside, youll find just what the PC Doctor ordered with the fix-it-yourself PC home remedies you need to take good care of your computer. Learn how to interpret error messages, troubleshoot common problems, and resolve performance issues. Plus, get handy checklists at the end of each chapter to help you with ongoing maintenance. This step-by-step resource empowers you with the knowledge and skills you need to keep your PC running smoothly.. . Learn the anatomy of your PC to better care for it. Maintain your file system properly. Upgrade your PC--add memory, components, devices, and more. Protect your PC from viruses, worms, hackers, and other threats. Troubleshoot and back up your hard drive. Take advantage of CD and DVD storage capacity. Network PCs together and share resources, such as printers, hard drives, and more. Connect devices to your PC using expansion cards and ports. Make the most of the Internet--from getting a better connection to speeding up your browser. Get expert advice on where to find more information to help yourself. .

Adrian Kingsley-Hughes is a technical director and consultant for a U.K.-based computer company. He teaches many PC-related courses, including one entitled Caring for Your PC. He has taught many thousands of people to fix their PC problems for themselves, and this inspired him to write this book..

UbiComp 2004: Ubiquitous Computing - 6th International Conference, Nottingham, UK, September 7-10, 2004, Proceedings... UbiComp 2004: Ubiquitous Computing - 6th International Conference, Nottingham, UK, September 7-10, 2004, Proceedings (Paperback, 2004 ed.)
Nigel Davies, Elizabeth Mynatt, Itiro Siio
R1,770 Discovery Miles 17 700 Ships in 10 - 15 working days

Welcome to the proceedings of UbiComp 2004. In recent years the ubiquitous computing community has witnessed a sign- cant growth in the number of conferences in the area, each with its own disti- tive characteristics. For UbiComp these characteristics have always included a high-quality technical program and associated demonstrations and posters that cover the full range of research being carried out under the umbrella of ubiq- tous computing. Ours is a broaddiscipline andUbiComp aims to be aninclusive forum that welcomes submissions from researchers with many di?erent ba- grounds. This year we received 145 submissions. Of these we accepted 26, an acceptance rate of just under 18%. Of course acceptance rate is simply a m- sure of selectivity rather than quality and we were particularly pleased this year to note that we had a large number of high-quality submissions from which to assemble the program for 2004. The broad nature of ubiquitous computing research makes reviewing Ubi- Comp submissions a particular challenge. This year we adopted a new process for review and selection that has, we hope, resulted in all authors obtaining - tremely detailed feedback on their submission whether or not it was accepted for publication. We believe the process enabled us to assemble the best pos- ble program for delegates at the conference. If you submitted a paper, we hope that you bene?ted from the feedback that your peers have provided, and if you attended UbiComp 2004 we hope that you enjoyed the technical program.

Degunking Your PC (Paperback): Joli Ballew, Jeff Duntemann Degunking Your PC (Paperback)
Joli Ballew, Jeff Duntemann
R706 Discovery Miles 7 060 Ships in 12 - 17 working days

"Degunking Your PC takes Paraglyph's unique "degunking" approach--an easy to follow, tried and true, 12 step method to get your PC and all your gadgets running in tip-top shape. It covers techniques for everything from tweaking your monitor to suit your needs, installing/uninstalling peripherals, to networking several computers without technical jargon. Is your wireless keyboard fighting with your wireless mouse? Do you really need to keep those desktop speakers? Don't know how to get rid of old drivers or where they are hiding? Do you know how to physically clean your hard drive, scanners, print heads, and monitors? Can you see the top and the underside of your desk or is it cluttered with devices and cables and unidentifiable wires? If this sounds familiar, you have some degunking to do! Learn about the joys and headaches of Wi-Fi networking, why good printers go bad, all about USB and FireWire and free yourself from cords. If you are still in the dial-up Dark Ages, you'll learn everything you need to know about Moving to DSL or cable. When it's finally time to say goodbye to your old devices, learn the proper way to donate, recycle or dispose of them and choose the right upgrades for your needs.

The Healthy PC - Preventive Care and Home Remedies for Your Computer (Paperback, Ed): Carey Holzman, Robert Shimonski The Healthy PC - Preventive Care and Home Remedies for Your Computer (Paperback, Ed)
Carey Holzman, Robert Shimonski
R615 R517 Discovery Miles 5 170 Save R98 (16%) Ships in 10 - 15 working days

Learn routine maintenance as well as desktop basics, hard drive care and defragmentation, and plenty more to make your PC more efficient and keep it running smoothly. Learn software management, tame the Internet, secure your machine, deal with downloads, and much more.

PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed): David Melnick, Asynchrony Solutions, Inc., Mark... PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed)
David Melnick, Asynchrony Solutions, Inc., Mark Dinman, Alexander Muratov
R1,163 Discovery Miles 11 630 Ships in 10 - 15 working days

LOCK IN PDA SECURITY:

* Let an IT security expert help you assess the PDA threat to your business

* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks

* Maximize and protect the value of increasingly capable personal digital assistants to your organization


DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS.


PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you’re an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to:

* Assess the level of threat posed by PDAs in your organization

* Develop a measured and enforceable policy response to minimize the risk

* Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse

* Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM

* Examine a case study on securing Palm for the work environment

* Learn why solutions almost always involve the operating system

* Discover what White-Hat Hacking reveals about vulnerabilities

* Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks

* Get an insider’s preview of the future of handhelds -- the PCs of the early twenty-first century


With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA).


For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.com
PC Mod Projects - Cool It!  Light It!  Morph It! (Paperback, Ed): Edward Chen, Carl Mixon, Philip Mansfield, Grace Punska PC Mod Projects - Cool It! Light It! Morph It! (Paperback, Ed)
Edward Chen, Carl Mixon, Philip Mansfield, Grace Punska
R842 R704 Discovery Miles 7 040 Save R138 (16%) Ships in 10 - 15 working days

Make PC stand for "personalized and customized"--mod it to increase performance or simply to improve its looks and think outside the plain beige box. Go beyond the manufacturer's limits and add a high-performance heatsink, or increase functionality of your box by adding more controls and ports in the front. Get the psychological edge in LAN gaming by morphing your box with lights, windows, custom paint jobs, and more. Divided into four distinct projects, each one written by a field expert, this hands-on guide delivers professional instruction on installing a water-cooling system, adding lights, morphing the case, and much more.Cut windows, install plumbing, and paint your case Illuminate your box by adding lights Install fiber optics, light-emitting diodes, and cold cathode fluorescents Build a switch interface Transform your box into an aquarium by water-cooling your components Morph your case and add accessories Use molding techniques Use alternative enclosures or acrylic cases--even an old gas can--to house your components

How to do Everything with Your Zire Handheld (Paperback, Ed): Rick Broida, Dave Johnson How to do Everything with Your Zire Handheld (Paperback, Ed)
Rick Broida, Dave Johnson
R601 R501 Discovery Miles 5 010 Save R100 (17%) Ships in 10 - 15 working days

This friendly, solutions-oriented guide is filled with step-by-step examples that illustrate how to set up and navigate your Zire, and make the most of the hardware, built-in applications, and third-party tools. Each chapter begins with the specific how-to topics that will be covered. Within the chapter, each topic is accompanied by a solid, easy-to-follow walkthrough of the process.

How to Do Everything with Your CLIE(TM) (Paperback, 3rd ed): Rick Broida, Dave Johnson How to Do Everything with Your CLIE(TM) (Paperback, 3rd ed)
Rick Broida, Dave Johnson
R861 R723 Discovery Miles 7 230 Save R138 (16%) Ships in 10 - 15 working days

Tap the power and efficiency of handheld computing with this practical guide to one of todays hottest PDA devices available. This easy-to-follow book will show you how to get the most out of your exciting handheld computer, master its built-in applications, and discover numerous third-party software applications that enhance your overall CLIE experience.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Laptops For Seniors For Dummies, 6th…
F. Wempen Paperback R618 R450 Discovery Miles 4 500
Computers and the Law
Dana van der Merwe Paperback R485 R427 Discovery Miles 4 270
PCs For Dummies, 13e
D. Gookin Paperback  (1)
R692 R495 Discovery Miles 4 950
Laptops for Seniors in easy steps…
Nick Vandome Paperback R341 Discovery Miles 3 410
CoCo - The Colorful History of Tandy's…
Boisy G Pitre, Bill Loguidice Paperback R1,437 Discovery Miles 14 370
Time Series with Mixed Spectra
Ta-Hsin Li Paperback R1,967 Discovery Miles 19 670
Encyclopedia of Microcomputers - Volume…
Allen Kent, James G. Williams Hardcover R3,210 Discovery Miles 32 100
Compact Numerical Methods for Computers…
John C. Nash Hardcover R5,349 R3,705 Discovery Miles 37 050
Encyclopedia of Microcomputers - Volume…
Allen Kent, James G. Williams Hardcover R8,001 R6,274 Discovery Miles 62 740
Critical Technology - A Social Theory of…
Graeme Kirkpatrick Paperback R1,107 R950 Discovery Miles 9 500

 

Partners