0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (634)
  • R250 - R500 (2,258)
  • R500+ (12,926)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Internet Multimedia Communications Using SIP - A Modern Approach Including Java (R) Practice (Hardcover): Rogelio Martinez Perea Internet Multimedia Communications Using SIP - A Modern Approach Including Java (R) Practice (Hardcover)
Rogelio Martinez Perea
R1,948 Discovery Miles 19 480 Ships in 12 - 19 working days

Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other, see each other, work collaboratively or send messages in real time. Internet telephony and, in general, Internet multimedia, is the new revolution today and SIP is the key protocol which allows this revolution to grow.
The book explains, in tutorial fashion, the underlying technologies that enable real-time IP multimedia communication services in the Internet (voice, video, presence, instant messaging, online picture sharing, white-boarding, etc). Focus is on session initiation protocol (SIP) but also covers session description protocol (SDP), Real-time transport protocol (RTP), and message session relay protocol (MSRP). In addition, it will also touch on other application-related protocols and refer to the latest research work in IETF and 3GPP about these topics. (3GPP stands for "third-generation partnership project" which is a collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA (China), ATIS (North America) and TTA (South Korea).) The book includes discussion of leading edge theory (which is key to really understanding the technology) accompanied by Java examples that illustrate the theoretical concepts.
Throughout the book, in addition to the code snippets, the reader is guided to build a simple but functional IP soft-phone therefore demonstrating the theory with practical examples.
This book covers IP multimedia from both a theoretical and practical point of view focusing on letting the reader understand the concepts and put them into practice using Java. It includes lots of drawings, protocol diagrams, UML sequence diagrams and code snippets that allow the reader to rapidly understand the concepts.

KEY FEATURES
* Focus on HOW multimedia communications over the Internet works to allow readers to really understand and implement the technology
* Explains how SIP works, including many programming examples so the reader can understand abstract concepts like SIP dialogs, SIP transactions, etc.
* It is not focused on just VoIP. It looks At a wide array of enhanced communication services related to SIP enabling the reader put this technology into practice.
* Includes nearly 100 references to the latest standards and working group activities in the IETF, bringing the reader completely up to date.
* Provides a step-by-step tutorial on how to build a basic, though functional, IP soft-phone allowing the reader to put concepts into practice.
* For advanced readers, the book also explains how to build a SIP proxy and a SIP registrar to enhance one's expertise and marketability in this fast moving area.

Cloud Data Management (Hardcover, 2014 ed.): Liang Zhao, Sherif Sakr, Anna Liu, Athman Bouguettaya Cloud Data Management (Hardcover, 2014 ed.)
Liang Zhao, Sherif Sakr, Anna Liu, Athman Bouguettaya
R3,583 R1,982 Discovery Miles 19 820 Save R1,601 (45%) Ships in 12 - 19 working days

In practice, the design and architecture of a cloud varies among cloud providers. We present a generic evaluation framework for the performance, availability and reliability characteristics of various cloud platforms. We describe a generic benchmark architecture for cloud databases, specifically NoSQL database as a service. It measures the performance of replication delay and monetary cost.

Service Level Agreements (SLA) represent the contract which captures the agreed upon guarantees between a service provider and its customers. The specifications of existing service level agreements (SLA) for cloud services are not designed to flexibly handle even relatively straightforward performance and technical requirements of consumer applications. We present a novel approach for SLA-based management of cloud-hosted databases from the consumer perspective and an end-to-end framework for consumer-centric SLA management of cloud-hosted databases. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the monetary cost of the allocated computing resources. In this framework, the SLA of the consumer applications are declaratively defined in terms of goals which are subjected to a number of constraints that are specific to the application requirements. The framework continuously monitors the application-defined SLA and automatically triggers the execution of necessary corrective actions (scaling out/in the database tier) when required. The framework is database platform-agnostic, uses virtualization-based database replication mechanisms and requires zero source code changes of the cloud-hosted software applications.

Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016): Michael Workman Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016)
Michael Workman
R4,402 R3,545 Discovery Miles 35 450 Save R857 (19%) Ships in 12 - 19 working days

This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.

Human Computer Interaction Research in Web Design and Evaluation (Hardcover): Human Computer Interaction Research in Web Design and Evaluation (Hardcover)
R2,700 Discovery Miles 27 000 Ships in 10 - 15 working days

Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense. ""Human Computer Interaction Research in Web Design and Evaluation"" is a comprehensive book on HCI and Web design that focuses on various areas of research including theories, analysis, design, and evaluation. This book not only features the human aspect of Web design, but also highlights the social and cultural issues in designing for a wider audience.

The Passive Income Blueprint - 4 Books in 1: Discover the Ways to Create Passive Income and Make Money Online with Ecommerce... The Passive Income Blueprint - 4 Books in 1: Discover the Ways to Create Passive Income and Make Money Online with Ecommerce using Shopify, Amazon FBA, Affiliate Marketing, Retail Arbitrage, and eBay (Hardcover)
Income Mastery
R1,096 R941 Discovery Miles 9 410 Save R155 (14%) Ships in 10 - 15 working days
Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E... Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, Tokyo, Japan (Hardcover, 2008 ed.)
Makoto Oya, Ryuya Uda, Chizuko Yasunobu
R3,099 Discovery Miles 30 990 Ships in 10 - 15 working days

The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.

Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice,... Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Michele Bezzi, Penny Duquenoy, Simone Fischer-Hubner, Marit Hansen, Ge Zhang
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.

Semantic Web Services - Theory, Tools And Applications (Hardcover): Jorge Cardoso Semantic Web Services - Theory, Tools And Applications (Hardcover)
Jorge Cardoso
R4,609 Discovery Miles 46 090 Ships in 10 - 15 working days

The Semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive and transportable machine understanding. ""Semantic Web Services: Theory, Tools and Applications"" brings contributions from researchers, scientists from both industry and academia, and representatives from different communities to study, understand, and explore the theory, tools, and applications of the Semantic Web. ""Semantic Web Services: Theory, Tools and Applications"" binds computing involving the Semantic Web, ontologies, knowledge management, Web services, and Web processes into one fully comprehensive resource, serving as the platform for exchange of both practical technologies and far reaching research.

Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised... Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised Selected Papers (Hardcover, 1st ed. 2021)
Zhongzhi Shi, Mihir Chakraborty, Samarjit Kar
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.

Think Like a Breadwinner - A  Manifesto to Help Women Make the Most of their Money (Paperback): Jennifer Barrett Think Like a Breadwinner - A Manifesto to Help Women Make the Most of their Money (Paperback)
Jennifer Barrett
R285 R258 Discovery Miles 2 580 Save R27 (9%) Ships in 5 - 10 working days

A new manifesto for the working woman, full of practical tips for making the most of your earnings as well as inspiration for harnessing the freedom and power that come with financial independence. In Think Like a Breadwinner, financial expert Jennifer Barrett dismantles the narrative that women don't - and shouldn't - take full control of their finances to create the lives they want for themselves. Featuring a wide variety of case studies from women at all stages of their careers and financial lives, Barrett shares the secrets of women who already think like breadwinners. Practical and empowering, this book includes advice on: - Changing how you think about money - Asking for promotions and raises at work - Saving and investing your money - How to combine breadwinning and parenting - Prioritising your future Perfect for anyone who thinks they're 'no good with money', Think Like a Breadwinner will show you that no matter your circumstances, you can set yourself up for financial security.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R3,034 Discovery Miles 30 340 Ships in 10 - 15 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Prediction and Inference from Social Networks and Social Media (Hardcover, 1st ed. 2017): Jalal Kawash, Nitin Agarwal, Tansel... Prediction and Inference from Social Networks and Social Media (Hardcover, 1st ed. 2017)
Jalal Kawash, Nitin Agarwal, Tansel Oezyer
R3,822 R3,540 Discovery Miles 35 400 Save R282 (7%) Ships in 12 - 19 working days

This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.

Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008): Slawomir Stanczak,... Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008)
Slawomir Stanczak, Marcin Wiczanowski, Holger Boche
R3,136 Discovery Miles 31 360 Ships in 10 - 15 working days

The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.

Visual Knowledge Modeling for Semantic Web Technologies - Models and Ontologies (Hardcover): Visual Knowledge Modeling for Semantic Web Technologies - Models and Ontologies (Hardcover)
R5,031 Discovery Miles 50 310 Ships in 10 - 15 working days

Visual Knowledge Modeling for Semantic Web Technologies: Models and Ontologies aims to make visual knowledge modeling available to individuals as an intellectual method and a set of tools at different levels of formalization. It aims to provide to its readers a simple, yet powerful visual language to structure their thoughts, analyze information, transform it to personal knowledge, and communicate information to support knowledge acquisition in collaborative activities.

Terminological Ontologies - Design, Management and Practical Applications (Hardcover, 2010 ed.): Javier Lacasta, Javier... Terminological Ontologies - Design, Management and Practical Applications (Hardcover, 2010 ed.)
Javier Lacasta, Javier Nogueras-Iso, Francisco Javier Zarazaga-Soria
R2,993 Discovery Miles 29 930 Ships in 10 - 15 working days

Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the infrastructure. Terminological Ontologies: Design, Management and Practical Applications presents the main problems that affect the discovery systems of information infrastructures to manage terminological models, and introduces a combination of research tools and applications in Semantic Web technologies. This book specifically analyzes the need to create, relate, and integrate the models required for an infrastructure by elaborating on the problem of accessing these models in an efficient manner via interoperable services and components. Terminological Ontologies: Design, Management and Practical Applications is geared toward information management systems and semantic web professionals working as project managers, application developers, government workers and more. Advanced undergraduate and graduate level students, professors and researchers focusing on computer science will also find this book valuable as a secondary text or reference book.

Autonomous Systems - Self-Organization, Management, and Control - Proceedings of the 8th International Workshop held at... Autonomous Systems - Self-Organization, Management, and Control - Proceedings of the 8th International Workshop held at Shanghai Jiao Tong University, Shanghai, China, October 6-7, 2008 (Hardcover, 2008 ed.)
Bernd Mahr, Huanye Sheng
R2,876 Discovery Miles 28 760 Ships in 10 - 15 working days

The 2008 TUB-SJTU joint workshop on Autonomous Systems Self-Organization, Management, and Control was held on October 6, 2008 at Shanghai Jiao Tong University, Shanghai, China. The workshop, sponsored by Shanghai Jiao Tong University and Technical University of Berlin brought together scientists and researchers from both universities to present and discuss the latest progress on autonomous systems and its applications in diverse areas. Autonomous systems are designed to integrate machines, computing, sensing, and software to create intelligent systems capable of interacting with the complexities of the real world. Autonomous systems represent the physical embodiment of machine intelligence.

Topics of interest include, but are not limited to theory and modeling for autonomous systems; organization of autonomous systems; learning and perception; complex systems; multi-agent systems; robotics and control; applications of autonomous systems.

The 60-Minute Podcast Startup - A Proven System to Start Your Podcast in 1 Hour a Day and Get Your Initial Audience in 30 Days... The 60-Minute Podcast Startup - A Proven System to Start Your Podcast in 1 Hour a Day and Get Your Initial Audience in 30 Days (or Less) (Hardcover)
Ramesh K Dontha
R480 Discovery Miles 4 800 Ships in 12 - 19 working days
Semantic Web Services - Concepts, Technologies, and Applications (Hardcover, 2007 ed.): Rudi Studer, Stephan Grimm, Andreas... Semantic Web Services - Concepts, Technologies, and Applications (Hardcover, 2007 ed.)
Rudi Studer, Stephan Grimm, Andreas Abecker
R3,623 R1,754 Discovery Miles 17 540 Save R1,869 (52%) Ships in 12 - 19 working days

In this volume, Rudi Studer and his team deliver a self-contained compendium about the exciting field of Semantic Web services, starting with the basic standards and technologies and also including advanced applications in eGovernment and eHealth. The contributions provide both the theoretical background and the practical knowledge necessary to understand the essential ideas and to design new cutting-edge applications.

Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,589 Discovery Miles 45 890 Ships in 12 - 19 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

The Shallows - How the Internet Is Changing the Way We Think, Read and Remember (Paperback, Main - Re-issue): Nicholas Carr The Shallows - How the Internet Is Changing the Way We Think, Read and Remember (Paperback, Main - Re-issue)
Nicholas Carr
R304 Discovery Miles 3 040 Ships in 12 - 19 working days

'Boldly reactionary... What looks like feast, Carr argues, may be closer to famine' Sunday Times 'Chilling' The Economist In this ground-breaking and compelling book, Nicholas Carr argues that not since Gutenberg invented printing has humanity been exposed to such a mind-altering technology. The Shallows draws on the latest research to show that the Net is literally re-wiring our brains inducing only superficial understanding. As a consequence there are profound changes in the way we live and communicate, remember and socialise - even in our very conception of ourselves. By moving from the depths of thought to the shallows of distraction, the web, it seems, is actually fostering ignorance. The Shallows is not a manifesto for luddites, nor does it seek to turn back the clock. Rather it is a revelatory reminder of how far the Internet has become enmeshed in our daily existence and is affecting the way we think. This landmark book compels us all to look anew at our dependence on this all-pervasive technology. This 10th-anniversary edition includes a new afterword that brings the story up to date, with a deep examination of the cognitive and behavioural effects of smartphones and social media.

IPv6 Advanced Protocols Implementation (Hardcover): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Advanced Protocols Implementation (Hardcover)
Qing Li, Jinmei Tatuya, Keiichi Shima
R2,049 Discovery Miles 20 490 Ships in 12 - 19 working days

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Specifically, this book engages the readers in advanced topics such as routing, multicasting, DNS, DHCPv6, mobility, and security.
This two-volume series covers a wide spectrum of the IPv6 technology, help the readers establish solid and empirical understanding on IPv6 and the KAME reference implementation paralleled by none.
Key Features:
* Extensive code listings with meticulous line-by-line explanation of rationale and use for KAME snapshot implementations on advanced IPv6 related protocols, including:
-Unicast and multicast routing and DNS client based on KAME snapshot dated April 2003, which are a base of more recent versions of BSD variants
-Mobile IPv6 based on KAME snapshot dated July 2004, a predecessor version of the "SHISA" implementation
-DHCPv6 based on KAME snapshot dated May 2005, a base of the WIDE-DHCPv6 implementation available at SourceForge today
* Numerous diagrams and illustrations help in visualizing the implementation
* In-depth discussion of the standards provides intrinsic understanding of the specifications
* An introduction to the IP security protocols along with the use of the racoon key exchange daemon
* Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software

* The only authoritative reference "cookbook" for anyone interested in advanced IPv6 topics and protocols.
* Line-by-line walk through of real code helps the reader master IPv6 implementation
* Comprehensive in scope, based on a working standard, and thoroughly illustrated to bring the protocols alive.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R986 R848 Discovery Miles 8 480 Save R138 (14%) Ships in 10 - 15 working days
X3D - Extensible 3D Graphics for Web Authors (Paperback): Don Brutzman, Leonard Daly X3D - Extensible 3D Graphics for Web Authors (Paperback)
Don Brutzman, Leonard Daly
R1,888 Discovery Miles 18 880 Ships in 12 - 19 working days

In the early days of the Web a need was recognized for a language to display 3D objects through a browser. An HTML-like language, VRML, was proposed in 1994 and became the standard for describing interactive 3D objects and worlds on the Web. 3D Web courses were started, several best-selling books were published, and VRML continues to be used today. However VRML, because it was based on HTML, is a stodgy language that is not easy to incorporate with other applications and has been difficult to add features to. Meanwhile, applications for interactive 3D graphics have been exploding in areas such as medicine, science, industry, and entertainment. There is a strong need for a set of modern Web-based technologies, applied within a standard extensible framework, to enable a new generation of modeling & simulation applications to emerge, develop, and interoperate. X3D is the next generation open standard for 3D on the web. It is the result of several years of development by the Web 3D Consortium's X3D Task Group. Instead of a large monolithic specification (like VRML), which requires full adoption for compliance, X3D is a component-based architecture that can support applications ranging from a simple non-interactive animation to the latest streaming or rendering applications. X3D replaces VRML, but also provides compatibility with existing VRML content and browsers. Don Brutzman organized the first symposium on VRML and is playing a similar role with X3D; he is a founding member of the consortium. Len Daly is a professional member of the consortium and both Len and Don have been involved with the development of the standard from the start.
* The first book on the new way to present interactive 3D content over the Web, written by two of the designers of the standard
* Plentiful illustrations and screen shots in the full color text
* Companion website with extensive content, including the X3D specification, sample code and applications, content creation tools, and demos of compatible Web browsers

Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 3 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 3 (Hardcover)
Information R Management Association
R15,767 Discovery Miles 157 670 Ships in 10 - 15 working days
The Social and Cognitive Impacts of e-Commerce on Modern Organizations (Hardcover, illustrated Edition): Mehdi Khosrowpour The Social and Cognitive Impacts of e-Commerce on Modern Organizations (Hardcover, illustrated Edition)
Mehdi Khosrowpour
R2,192 Discovery Miles 21 920 Ships in 10 - 15 working days

The Social and Cognitive Impacts of E-Commerce on Modern Organizations includes articles addressing the social, cultural, organizational, and cognitive impacts of e-commerce technologies and advances on organizations around the world. Looking specifically at the impacts of electronic commerce on consumer behavior, as well as the impact of e-commerce on organizational behavior, development, and management in organizations. This important new book aims to expand the overall body of knowledge regarding the human aspects of electronic commerce technologies and utilization in modern organizations and to assist researchers and practitioners to devise more effective systems for managing the human side of e-commerce.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
This Is For Everyone
Tim Berners-Lee Paperback R399 R329 Discovery Miles 3 290
Indexing - From Thesauri to the Semantic…
Piet de Keyser Paperback R1,739 Discovery Miles 17 390
Social Reading - Platforms…
Jose Antonio Cordon Garcia, Julio Alonso Arevalo, … Paperback R1,601 Discovery Miles 16 010
Facebook
Dana Kilroy Fold-out book or chart R244 Discovery Miles 2 440
Web 2.0 and Libraries - Impacts…
Dave Parkes, Geoff Walton Paperback R1,404 Discovery Miles 14 040
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Understanding the Internet - A Glimpse…
Kevin Curran Paperback R1,746 Discovery Miles 17 460
The Price Of Money - How To Prosper In A…
Rob Dix Paperback R438 Discovery Miles 4 380
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R530 R499 Discovery Miles 4 990

 

Partners