0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (676)
  • R250 - R500 (2,190)
  • R500+ (12,333)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Information Systems - The e-Business Challenge (Hardcover, 2002 ed.): Roland Traunmuller Information Systems - The e-Business Challenge (Hardcover, 2002 ed.)
Roland Traunmuller
R2,792 Discovery Miles 27 920 Ships in 18 - 22 working days

Information Systems: The e-Business Challenge Indisputable, e-Business is shaping the future inspiring a growing range of innovative business models. To bring it to the point: the Internet has redefined the way electronic business is performed. In an electronic supported business all relationships are transformed -may it be a seller-to buyer relationship or a an agency-to-citizen relationship. So for instance in commerce new business models incorporate various activities: promoting and communicating company and product information to a global user base; accepting orders and payments for goods and services; providing ongoing customer support; getting feedback and spurring collaboration for a new product development. There are several ways of further differentiating e-Business such as sketching some diversions on various levels: e-Commerce, e-Government; B2C, B2B, B2G, G2C; Customer Relationship Management, Business Intelligence and so on. Further distinctions may follow divergent criteria such as separating in business stages. Thus particular problem domains emerge. They all state of its own guiding the development of adequate information systems."

Industrial Sensors and Controls in Communication Networks - From Wired Technologies to Cloud Computing and the Internet of... Industrial Sensors and Controls in Communication Networks - From Wired Technologies to Cloud Computing and the Internet of Things (Hardcover, 1st ed. 2019)
Dong Seong Kim, Hoa Tran-Dang
R3,363 Discovery Miles 33 630 Ships in 18 - 22 working days

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network architectures, and resource management and optimization for industrial networks. Discussions are also provided on industrial communication standards for both wired and wireless technologies, as well as for the Industrial Internet of Things (IIoT). Topics and features: describes the FlexRay, CAN, and Modbus fieldbus protocols for industrial control networks, as well as the MIL-STD-1553 standard; proposes a dual fieldbus approach, incorporating both CAN and ModBus fieldbus technologies, for a ship engine distributed control system; reviews a range of industrial wireless sensor network (IWSN) applications, from environmental sensing and condition monitoring, to process automation; examines the wireless networking performance, design requirements, and technical limitations of IWSN applications; presents a survey of IWSN commercial solutions and service providers, and summarizes the emerging trends in this area; discusses the latest technologies and open challenges in realizing the vision of the IIoT, highlighting various applications of the IIoT in industrial domains; introduces a logistics paradigm for adopting IIoT technology on the Physical Internet. This unique work will be of great value to all researchers involved in industrial sensor and control networks, wireless networking, and the Internet of Things.

Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Hardcover, 2013 ed.): Przemyslaw Ignaciuk,... Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Hardcover, 2013 ed.)
Przemyslaw Ignaciuk, Andrzej Bartoszewicz
R2,718 Discovery Miles 27 180 Ships in 18 - 22 working days

Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods.
The authors address a number of difficult real-life problems, such as:
optimal control of flows with disparate, time-varying delay;
the existence of source and channel nonlinearities;
the balancing of quality of service and fairness requirements; and
the incorporation of variable rate allocation policies.
Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today s networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks.
Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks."

Internet of Things and Advanced Application in Healthcare (Hardcover): Catarina I. Reis, Marisa da Silva Maximiano Internet of Things and Advanced Application in Healthcare (Hardcover)
Catarina I. Reis, Marisa da Silva Maximiano
R5,263 Discovery Miles 52 630 Ships in 18 - 22 working days

The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications. Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications. Topics Covered: Assistive Technologies Context-Aware Computing Systems Health Risk Management Healthcare Support Systems Reliability Concerns Smart Healthcare Wearable Sensors

Virtual Reality: Applications and Developments (Hardcover): Josh Creel Virtual Reality: Applications and Developments (Hardcover)
Josh Creel
R2,599 R2,367 Discovery Miles 23 670 Save R232 (9%) Ships in 18 - 22 working days
Advances in Real-Time Systems (Hardcover, 2012): Samarjit Chakraborty, Joerg Eberspacher Advances in Real-Time Systems (Hardcover, 2012)
Samarjit Chakraborty, Joerg Eberspacher
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

This volume contains the lectures given in honor to Georg Farber as tribute to his contributions in the area of real-time and embedded systems. The chapters of many leading scientists cover a wide range of aspects, like robot or automotive vision systems or medical aspects. "

Web Search: Public Searching of the Web (Hardcover, 2004 ed.): Amanda Spink, Bernard J Jansen Web Search: Public Searching of the Web (Hardcover, 2004 ed.)
Amanda Spink, Bernard J Jansen
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

Web Search: Public Searching of the Web, co-authored by Drs. Amanda Spink and Bernard J. Jansen, is one of the first manuscripts that address the human - system interaction of Web searching in a thorough and complete manner. The authors provide an examination of Web searching from multiple levels of analysis, from theoretical overview to detailed study of term usage, and integrate these different levels of analysis into a coherent picture of how people locate information on the Web using search engines.

Drawing primarily on their own research and work in the field, the authors present the temporal changes in, the growth of, and the stability of how people interact with Web search engines. Drs. Spink and Jansen present results from an analysis of multiple search engine data sets over a six year period, giving a firsthand account of the emergence of Web searching. They also compare and contrast their findings to the results of other researchers in the field, providing a valuable bibliographic resource.

This research is directly relevant to those interested in providing information or services on the Web, along with those who research and study the Web as an information resource. Graduate students, academic and corporate researchers, search engine designers, information architects, and search engine optimizers will find the book of particular benefit.

The Fundamentals of Brand SERPs for Business (Hardcover): Jason Barnard The Fundamentals of Brand SERPs for Business (Hardcover)
Jason Barnard
R646 Discovery Miles 6 460 Ships in 10 - 15 working days
Collecting and Conserving Net Art - Moving beyond Conventional Methods (Hardcover): Annet Dekker Collecting and Conserving Net Art - Moving beyond Conventional Methods (Hardcover)
Annet Dekker
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Collecting and Conserving Net Art explores the qualities and characteristics of net art and its influence on conservation practices. By addressing and answering some of the challenges facing net art and providing an exploration of its intersection with conservation, the book casts a new light on net art, conservation, curating and museum studies. Viewing net art as a process rather than as a fixed object, the book considers how this is influenced by and executed through other systems and users. Arguing that these processes and networks are imbued with ambiguity, the book suggests that this is strategically used to create suspense, obfuscate existing systems and disrupt power structures. The rapid obsolescence of hard and software, the existence of many net artworks within restricted platforms and the fact that artworks often act as assemblages that change or mutate, make net art a challenging case for conservation. Taking the performative and interpretive roles conservators play into account, the book demonstrates how practitioners can make more informed decisions when responding to, critically analysing or working with net art, particularly software-based processes. Collecting and Conserving Net Art is intended for researchers, academics and postgraduate students, especially those engaged in the study of museum studies, conservation and heritage studies, curatorial studies, digital art and art history. The book should also be interesting to professionals who are involved in the conservation and curation of digital arts, performance, media and software.

Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.): David Jaramillo, Borko Furht, Ankur Agarwal Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,381 Discovery Miles 13 810 Ships in 18 - 22 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Future Directions for Intelligent Systems and Information Sciences - The Future of Speech and Image Technologies, Brain... Future Directions for Intelligent Systems and Information Sciences - The Future of Speech and Image Technologies, Brain Computers, WWW, and Bioinformatics (Hardcover, 2000 ed.)
Nikola Kasabov
R4,237 Discovery Miles 42 370 Ships in 18 - 22 working days

This edited volume comprises invited chapters that cover five areas of the current and the future development of intelligent systems and information sciences. Half of the chapters were presented as invited talks at the Workshop "Future Directions for Intelligent Systems and Information Sciences" held in Dunedin, New Zealand, 22-23 November 1999 after the International Conference on Neuro-Information Processing (lCONIPI ANZIISI ANNES '99) held in Perth, Australia. In order to make this volume useful for researchers and academics in the broad area of information sciences I invited prominent researchers to submit materials and present their view about future paradigms, future trends and directions. Part I contains chapters on adaptive, evolving, learning systems. These are systems that learn in a life-long, on-line mode and in a changing environment. The first chapter, written by the editor, presents briefly the paradigm of Evolving Connectionist Systems (ECOS) and some of their applications. The chapter by Sung-Bae Cho presents the paradigms of artificial life and evolutionary programming in the context of several applications (mobile robots, adaptive agents of the WWW). The following three chapters written by R.Duro, J.Santos and J.A.Becerra (chapter 3), GCoghill . (chapter 4), Y.Maeda (chapter 5) introduce new techniques for building adaptive, learning robots.

Fire Your Boss - How to quit your job, stop selling your time and start making passive income while you sleep...and possibly... Fire Your Boss - How to quit your job, stop selling your time and start making passive income while you sleep...and possibly move to a tropical island (Hardcover)
Jonathan Green; Edited by Alice Fogliata
R605 Discovery Miles 6 050 Ships in 18 - 22 working days
Peer to Peer Accommodation Networks - An Examination (Hardcover): Sara Dolnicar Peer to Peer Accommodation Networks - An Examination (Hardcover)
Sara Dolnicar
R3,125 Discovery Miles 31 250 Ships in 10 - 15 working days

Peer to Peer Accommodation networks presents a new conceptual framework which offers an initial explanation for the continuing and rapid success of 'disruptive innovators' and their effects on the international hospitality industry, with a specific focus on Airbnb, in the international context. Using her first-hand experience as a host on both traditional holiday accommodation webpages and a peer-to-peer accommodation network, respected tourism academic Sara Dolnicar examines possible reasons for the explosive success of peer to peer accommodation networks, investigates related topics which are less frequently discussed - such as charitable activities and social activism - and offers a future research agenda. Using first hand empirical results, this text provides much needed insight into this 'disruptive innovator' for those studying and working within the tourism and hospitality industries. This book discusses a wealth of issues including: * The disruptive innovation model - the criteria for identifying and understanding new disruptive innovators, and how peer-to-peer accommodation networks comply with these; * The factors postulated to drive the success of these networks and the celebration of variation; * Who are genuine networks members, tourist motivators and the chance of the 'perfect match'; * Pricing, discrimination and stimulation of the creation of new businesses.

Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.): Adam Wierzbicki Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.)
Adam Wierzbicki
R4,150 Discovery Miles 41 500 Ships in 18 - 22 working days

This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.

Guide to Cisco Routers Configuration - Becoming a Router Geek (Hardcover, 2nd ed. 2017): Mohammed M. Alani Guide to Cisco Routers Configuration - Becoming a Router Geek (Hardcover, 2nd ed. 2017)
Mohammed M. Alani
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).

Protocol Engineering (Hardcover, 2012 ed.): Hartmut Koenig Protocol Engineering (Hardcover, 2012 ed.)
Hartmut Koenig
R2,294 Discovery Miles 22 940 Ships in 18 - 22 working days

Communication protocols form the operational basis of computer networks and tele communication systems. They are behavior conventions that describe how com munication systems inter act with each other, defining the temporal order of the interactions and the formats of the data units exchanged - essentially they determine the efficiency and reliability of computer networks. Protocol Engineering is an important discipline covering the design, validation, and implementation of communication protocols. Part I of this book is devoted to the fundamentals of communication protocols, describing their working principles and implicitly also those of computer networks. The author introduces the concepts of service, protocol, layer, and layered architecture, and introduces the main elements required in the description of protocols using a model language. He then presents the most important protocol functions. Part II deals with the description of communication proto cols, offering an overview of the various formal methods, the essence of Protocol Engineering. The author introduces the fundamental description methods, such as finite state machines, Petri nets, process calculi, and temporal logics, that are in part used as semantic models for formal description techniques. He then introduces one represen tative technique for each of the main description approaches, among others SDL and LOTOS, and surveys the use of UML for describing protocols. Part III covers the protocol life cycle and the most important development stages, presenting the reader with approaches for systematic protocol design, with various verification methods, with the main implementation techniques, and with strategies for their testing, in particular with conformance and interoperability tests, and the test description language TTCN. The author uses the simple data transfer example protocol XDT (eXample Data Transfer) throughout the book as a reference protocol to exemplify the various description techniques and to demonstrate important validation and implementation approaches. The book is an introduction to communication protocols and their development for undergraduate and graduate students of computer science and communication technology, and it is also a suitable reference for engineers and programmers. Most chapters contain exercises, and the author's accompanying website provides further online material including a complete formal description of the XDT protocol and an animated simulation visualizing its behavior.

Decompiling Java (Hardcover, 1st ed.): Godfrey Nolan Decompiling Java (Hardcover, 1st ed.)
Godfrey Nolan
R1,436 R1,189 Discovery Miles 11 890 Save R247 (17%) Ships in 18 - 22 working days

Both Java and .NET use the idea of a virtual machine (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or decompiled. This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets.While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? bytecodes and the Java Virtual Machine (JVM) than in any book yet published. This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do.Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract virtual processor and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s

Applied Evolutionary Algorithms in Java (Hardcover, 2003 ed.): Robert Ghanea-Hercock Applied Evolutionary Algorithms in Java (Hardcover, 2003 ed.)
Robert Ghanea-Hercock
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

Genetic algorithms provide a powerful range of methods for solving complex engineering search and optimization algorithms. Their power can also lead to difficulty for new researchers and students who wish to apply such evolution-based methods. "Applied Evolutionary Algorithms in Java" offers a practical, hands-on guide to applying such algorithms to engineering and scientific problems. The concepts are illustrated through clear examples, ranging from simple to more complex problems domains; all based on real-world industrial problems. Examples are taken from image processing, fuzzy-logic control systems, mobile robots, and telecommunication network optimization problems. The Java-based toolkit provides an easy-to-use and essential visual interface, with integrated graphing and analysis tools. Topics and features: *inclusion of a complete Java toolkit for exploring evolutionary algorithms *strong use of visualization techniques, to increase understanding *coverage of all major evolutionary algorithms in common usage *broad range of industrially based example applications *includes examples and an appendix based on fuzzy logic This book is intended for students, researchers, and professionals interested in using evolutionary algorithms in their work. No mathematics beyond basic algebra and Cartesian graphs methods are required, as the aim is to encourage applying the Java toolkit to develop the power of these techniques.

Foundation Flash Applications for Mobile Devices (Hardcover, 1st Corrected ed., Corr. 3rd printing): Richard Leggett, Weyert De... Foundation Flash Applications for Mobile Devices (Hardcover, 1st Corrected ed., Corr. 3rd printing)
Richard Leggett, Weyert De Boer, Scott Janousek
R1,533 Discovery Miles 15 330 Ships in 18 - 22 working days

With a growing number of mobile devices offering Flash support, it is an increasingly viable platform for the development of mobile applications. Foundation Flash Applications for Mobile Devices is just the book you need to learn how to take advantage of this new audience of mobile application users. Inside, it covers every facet of mobile Flash, from the essentials of the Flash Lite 1.1 and 2.X platforms and writing applications to testing your work and deploying to mobile users.

Applications presented include screensavers, wallpapers, data-consuming informational programs (such as movie, news, and stock tickers), quiz games, action games, and more. You are given tips on mobile Flash development best practices, and all of the essential topics are covered, including creating and using sound, vector graphics, and bitmaps; optimizing assets for the small screen; coding realistic physics for games; and consuming web services using PHP, Java, ColdFusion, and .NET.

Throughout the book, there are many samples to put together and learn from, and several bonus applications are also available to download and check out.

Product Configurators - Tools and Strategies for the Personalization of Objects (Hardcover): Fabio Schillaci Product Configurators - Tools and Strategies for the Personalization of Objects (Hardcover)
Fabio Schillaci
R4,502 Discovery Miles 45 020 Ships in 10 - 15 working days

This book provides a source of inspiration and a manual for designers, entrepreneurs and professionals who are looking into the practical application of product configurators. In this growing profession, there is a need for a book which focuses on the configuration process from a design perspective. The book delves into the practical application of configurators using case studies of selected firms that present their most significant works. It offers the reader tips, suggestions, technical details and critical issues which need to be considered, from experienced actors and pioneers worldwide, which include: Unfold, Belgium In-flexions, France Nervous System, USA Okinlab, Germany SkimLab, France Twikit, Belgium INDG, The Netherlands ZeroLight, United Kingdom 3Dimerce, The Netherlands 3DSource, USA Bagaar, Belgium MyCustomizer, Canada Combeenation, Austria

Objects and Systems - Principled Design with Implementations in C++ and Java (Hardcover, 1997 ed.): Bernard P. Zeigler Objects and Systems - Principled Design with Implementations in C++ and Java (Hardcover, 1997 ed.)
Bernard P. Zeigler
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

The author's aim in this textbook is to provide students with a clear understanding of the relationship between the principles of object-oriented programming and software engineering. Professor Zeigler takes an approach based on state representation to formal specification. Consequently, this book is unique through its - emphasis on formulating primitives from which all other functionality can be built; - integral use of a semi-formal behaviour specification language based on state transition concepts; -differentiation between behaviour and implementation; -a reusable heterogeneous container class library; -ability to show the elegance and power of ensemble methods with non-trivial examples. As a result, students studying software engineering will find this a distinctive and valuable approach to programming and systems engineering.

Internet and Technology Addiction - Breakthroughs in Research and Practice, VOL 2 (Hardcover): Information Reso Management... Internet and Technology Addiction - Breakthroughs in Research and Practice, VOL 2 (Hardcover)
Information Reso Management Association
R7,695 Discovery Miles 76 950 Ships in 18 - 22 working days
Internet E-Mail - Protocols, Standards, and Implementation (Hardcover): Lawrence Hughes Internet E-Mail - Protocols, Standards, and Implementation (Hardcover)
Lawrence Hughes
R3,256 Discovery Miles 32 560 Ships in 18 - 22 working days

Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.

Content and Workflow Management for Library Websites - Case Studies (Hardcover, New): Holly Yu Content and Workflow Management for Library Websites - Case Studies (Hardcover, New)
Holly Yu
R2,238 Discovery Miles 22 380 Ships in 18 - 22 working days

Using database-driven web pages or web content management (WCM) systems to manage increasingly diverse web content and to streamline workflows is a commonly practiced solution recognized in libraries to-day. However, limited library web content management models and funding constraints prevent many libraries from purchasing commercially available WCM systems. And, the lack of much needed technical expertise in building in-house WCM systems presents a great challenge for libraries of all types. Content and Workflow Management for Library Websites: Case Studies provides practical and applicable web content management solutions through case studies. It contains successful database-to-web applications as employed in a variety of academic libraries. The applications vary in scope and cover a range of practical how-to-do-it examples from database-driven web development, locally created web content management systems, systems for distributing content management responsibilities, dynamic content delivery, to open source tools, such as MySQL and PHP to manage the content. Issues and challenges associated with the development process are discussed. Authors will also discuss detours, sand traps, and missteps necessary to a real learning process.

Compression and Coding Algorithms (Hardcover, 2002 ed.): Alistair Moffat, Andrew Turpin Compression and Coding Algorithms (Hardcover, 2002 ed.)
Alistair Moffat, Andrew Turpin
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

Compression and Coding Algorithms describes in detail the coding mechanisms that are available for use in data compression systems. The well known Huffman coding technique is one mechanism, but there have been many others developed over the past few decades, and this book describes, explains and assesses them. People undertaking research of software development in the areas of compression and coding algorithms will find this book an indispensable reference. In particular, the careful and detailed description of algorithms and their implementation, plus accompanying pseudo-code that can be readily implemented on computer, make this book a definitive reference in an area currently without one.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R380 R202 Discovery Miles 2 020
Do You Web 2.0? - Public Libraries and…
Linda Berube Paperback R1,455 Discovery Miles 14 550
Introduction to Python Programming and…
B. Harwani Paperback  (2)
R935 Discovery Miles 9 350
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Website Visibility - The Theory and…
Melius Weideman Paperback R1,559 Discovery Miles 15 590
Dot.Con - How America Lost Its Mind and…
John Cassidy Paperback R439 R412 Discovery Miles 4 120
Understanding the Internet - A Glimpse…
Kevin Curran Paperback R1,647 Discovery Miles 16 470
The Price Of Money - How To Prosper In A…
Rob Dix Paperback R438 Discovery Miles 4 380
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450
Responsive Web Design with HTML 5 & CSS
Jessica Minnick Paperback R2,006 R1,823 Discovery Miles 18 230

 

Partners