![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
"This book is by far the most comprehensive and orderly treatment
of the subject. It is the work of experts with a wealth of both
theoretical and practical experience with the subject and its
connecting disciplines. It is an integral work... concepts and
notation are at the same consistent level throughout the book.
Quality of Service (QoS) is an absolutely critical part of any
telecommunication services. This work fills a gap in the literature
of what possibilities there are for satellites in providing global
Internet services." Excerpted from the Foreword by Raymond L.
Pickholtz, The George Washington University
This groundbreaking book analyses the geography of the commercial
Internet industry. It presents the first accurate map of Internet
domains in the world, by country, by region, by city, and for the
United States, by neighborhood.
Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.
This book presents the cyber culture of micro, macro, cosmological, and virtual computing. The book shows how these work to formulate, explain, and predict the current processes and phenomena monitoring and controlling technology in the physical and virtual space.The authors posit a basic proposal to transform description of the function truth table and structure adjacency matrix to a qubit vector that focuses on memory-driven computing based on logic parallel operations performance. The authors offer a metric for the measurement of processes and phenomena in a cyberspace, and also the architecture of logic associative computing for decision-making and big data analysis.The book outlines an innovative theory and practice of design, test, simulation, and diagnosis of digital systems based on the use of a qubit coverage-vector to describe the functional components and structures. Authors provide a description of the technology for SoC HDL-model diagnosis, based on Test Assertion Blocks Activated Graph. Examples of cyber-physical systems for digital monitoring and cloud management of social objects and transport are proposed. A presented automaton model of cosmological computing explains the cyclical and harmonious evolution of matter-energy essence, and also a space-time form of the Universe.
Web caching and content delivery technologies provide the
infrastructure on which systems are built for the scalable
distribution of information. This proceedings of the eighth annual
workshop, captures a cross-section of the latest issues and
techniques of interest to network architects and researchers in
large-scale content delivery. Topics covered include the
distribution of streaming multimedia, edge caching and computation,
multicast, delivery of dynamic content, enterprise content
delivery, streaming proxies and servers, content transcoding,
replication and caching strategies, peer-to-peer content delivery,
and Web prefetching.
Universal navigation is accessible primarily through smart phones providing users with navigation information regardless of the environment (i.e., outdoor or indoor). Universal Navigation for Smart Phones provide the most up-to-date navigation technologies and systems for both outdoor and indoor navigation. It also provides a comparison of the similarities and differences between outdoor and indoor navigation systems from both a technological stand point and user 's perspective. All aspects of navigation systems including geo-positioning, wireless communication, databases, and functions will be introduced. The main thrust of this book presents new approaches and techniques for future navigation systems including social networking, as an emerging approach for navigation.
Dynamic and Robust Streaming in and between Connected Consumer-Electronic Devices addresses a subject that is becoming more important over the years. On the one hand the arrival of home networks is imminent, and on the other hand we notice that chips integrate more and more functionality. The home network interconnects the Consumer Electronic (CE) devices in the home, and the individual CE-devices incorporate the chips to realize a ubiquitous streaming of video streams over this network. This book provides a comprehensive overview of the challenges that face us. The book shows that there are many similarities between traditional networking and networks in the chip. However, there are some different operational conditions that lead to original solutions. Dynamic and Robust Streaming in and between Connected Consumer-Electronic Devices focuses on the robustness aspects of the chosen technologies in the area of video streaming. Management of resources such as memory, bandwidth, CPU cycles, bus-cycles is an aspect that is prominent in many of the sections.
Building Scalable Network Services: Theory and Practice is on
building scalable network services on the Internet or in a network
service provider's network. The focus is on network services that
are provided through the use of a set of servers. The authors
present a tiered scalable network service model and evaluate
various services within this architecture. The service model
simplifies design tasks by implementing only the most basic
functionalities at lower tiers where the need for scalability
dominates functionality.
A welcome addition to Palgrave's Global Media Policy and Business series, Internet Governance and the Global South documents the role of the global south in Internet policymaking and challenges the globalization theories that declared the death of the state in global decision-making. Abu Bhuiyan argues that the global Internet politics is primarily a conflict between the states - the United States of America and the states of the global south - because the former controls Internet policymaking. The states of the global south have been both oppositional and acquiescing to the sponsored policies of the United States on Internet issues such as digital divide, multilingualism, intellectual property rights and cyber security. They do not oppose the neoliberal underpinnings of the policies promoted by the United States, but ask for an international framework to govern the Internet so that they can work as equal partners in setting norms for the global Internet.
SMIL 3.0: Multimedia for the Web, Mobile Devices and Daisy Talking Books is a revised introduction to - and resource guide for - the W3C SMIL language. It covers all aspects of the SMIL specification and covers all of SMIL's implem- tation profiles, from the desktop through the world of mobile SMIL devices. Based on the first version of the book, which covered SMIL 2.0, this edition has been updated with information from the past two releases of the SMIL l- guage. We have benefitted from comments and suggestions from many readers of the first edition, and have produced what we feel is the most comprehensive guide to SMIL available anywhere. Motivation for this Book While we were working on various phases of the SMIL recommendations, it became clear to us that the richness of the SMIL language could easily ov- whelm many Web authors and designers. In the 500+ pages that the SYMM working group needed to describe the 30+ SMIL elements and the 150+ SMIL attributes, there was not much room for background information or extensive examples. The focus of the specification was on implementation aspects of the SMIL language, not on the rationale or the potential uses of SMIL's declarative power.
"Security and Privacy in Social Networks" brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.
The 1990s saw a rapid rise in the proportion of market value represented by Internet companies. At the peak of the market, the value of US internet stocks alone exceeded $2 trillion, making these stocks nearly as valuable as the entire UK market. However, since March 2000 many internet stock values have declined precipitately. This book establishes a robust cashflow based methodology for internet valuation in relation to strategic issues, and includes compelling and topical case studies of leading players including Amazon.com and NTT DoCoMo.
The development of successful, usable Web-based systems and applications requires careful consideration of problems, needs, and unique circumstances within and among organizations. Uniting research from a number of different disciplines, Web engineering seeks to develop solutions and uncover new trends in the rapidly growing body of literature on Web system design, modeling, and methodology. Models for Capitalizing on Web Engineering Advancements: Trends and Discoveries contains research on new developments and existing applications made possible by the principles of Web engineering. With selections focused on a broad range of applications from telemedicine to geographic information retrieval this book provides a foundation for further study of the unique challenges faced by Web application designers.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
Spring Security in Action shows you how to use Spring Security to create applications you can be confident will withstand even the most dedicated attacks. Starting with essential "secure by design" principles, you'll learn common software vulnerabilities and how to avoid them right from the design stage. Through hands-on projects, you'll learn to manage system users, configure secure endpoints, and use, OAuth2 and OpenID Connect for authentication and authorization. As you go, you'll learn how to adapt Spring Security to different architectures, such as configuring Spring Security for Reactive applications and container-based applications orchestrated with Kubernetes. When you're done, you'll have a complete understanding of how to use Spring Security to protect your Java enterprise applications from common threats and attacks. Key Features * The principles of secure by design * The architecture of Spring Security * Spring Security contracts for password encoding, cryptography, and authentication * Applying Spring Security to different architecture styles For experienced Java developers with knowledge of other Spring tools. About the technology Your applications, along with the data they manage, are one of your organization's most valuable assets. No company wants their applications easily cracked by malicious attackers or left vulnerable by avoidable errors. The specialized Spring Security framework reduces the time and manpower required to create reliable authorization, authentication, and other security features for your Java enterprise software. Thanks to Spring Security, you can easily bake security into your applications, from design right through to implementation. Laurentiu Spilca is a dedicated development lead and trainer at Endava, where he leads the development of a project in the financial market of European Nordic countries. He has over ten years experience as a Java developer and technology teacher.
Before use, standard ERP systems such as SAP R/3 need to be customized to meet the concrete requirements of the individual enterprise. This book provides an overview of the process models, methods, and tools offered by SAP and its partners to support this complex and time-consuming process. It begins by characterizing the foundations of the latest ERP systems from both a conceptual and technical viewpoint, whereby the most important components and functions of SAP R/3 are described. The main part of the book then goes on to present the current methods and tools for the R/3 implementation based on newer process models (roadmaps).
In recent years, billions of dollars (and euros, yen, and other
currencies) have been spent by wireless services providers to
acquire the radio frequency spectrum needed to offer so-called
"Third Generation" (3G) mobile services. These services include
high-speed data, mobile Internet access and entertainment such as
games, music and video programs. Indeed, as voice communications
are substituted by data communications, software -rather than
terminals or networks- has become the driver of the wireless
industry. Meanwhile, services are becoming increasingly
specialized.
This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments. Practical insights are offered by an international selection of pre-eminent authorities, including case studies, best practices, and balanced corporate analyses. Emphasis is placed on the use of the latest software technologies and frameworks for life-cycle methods, including the design, implementation and testing stages of software development. Topics and features: * Reviews approaches for reusability, cost and time estimation, and for functional size measurement of distributed software applications * Discusses the core characteristics of a large-scale defense system, and the design of software project management (SPM) as a service * Introduces the 3PR framework, research on crowdsourcing software development, and an innovative approach to modeling large-scale multi-agent software systems * Examines a system architecture for ambient assisted living, and an approach to cloud migration and management assessment * Describes a software error proneness mechanism, a novel Scrum process for use in the defense domain, and an ontology annotation for SPM in distributed environments* Investigates the benefits of agile project management for higher education institutions, and SPM that combines software and data engineering This important text/reference is essential reading for project managers and software engineers involved in developing software for distributed computing environments. Students and researchers interested in SPM technologies and frameworks will also find the work to be an invaluable resource. Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and an Associate Lecturer (Research) at the University of Derby, UK. He also holds positions as Foreign Professor at NUST and IIU in Islamabad, Pakistan, and Professor Extraordinaire at the North West University Potchefstroom, South Africa.
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. This book is the second installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research and deployments. Advanced Web Services specifically focuses on advanced topics of Web services and SOC and covers topics including Web services transactions, security and trust, Web service management, real-world case studies, and novel perspectives and future directions. The editors present foundational topics in the first book of the collection, Web Services Foundations (Springer, 2013). Together, both books comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.
Perspectives in Spread Spectrum brings together studies and recent work on six exciting topics from the spread spectrum arts. The book gives a wide, collective view of trends, ideas, and techniques in the spread spectrum discipline, due to the authors' extensive work on spread spectrum techniques and applications from different vantage points. The inexorable march of electronics towards ever faster, ever smaller, and ever more powerful electronic and optical circuitry has wrought, and will continue to enable, profound changes in the spread spectrum arts, by allowing increasingly complex signalling waveforms and statistical tests to be implemented as the theory beyond spread spectrum continues to evolve. Perspectives in Spread Spectrum is divided into six chapters. The first chapter deals with sequence spreading design. There is not a single metric for design of spreading sequences; rather, the design is ideally tailored to the specific scenario of usage. This chapter delves into recent and very promising synthesis work. The second chapter deals with OFDM techniques. As channels become wider and trans-channel fading (or jamming) becomes frequency selective across the band, OFDM techniques may provide a powerful alternative design perspective. The third chapter is a generalization of the venerable Walsh functions. A new modulation scheme, Geometric Harmonic Modulation, GHM for short, is reviewed and characterized as a form of OFDM. From GHM, a further generalization of the Walsh functions is derived for non-binary signalling. The fourth chapter is concerned with some new and exciting results regarding the follower jammer paradigm. A counter-countermeasure technique is reviewed, notable for its counterintuitive characteristic which can be understood from a simple yet elegant game framework. The fifth chapter recounts some results pertaining to random coding for an optical spread spectrum link. The technique is based on laser speckle statistics and uses a coherent array of spatial light modulators at the transmitter but allows the receiver to be realized as a spatially distributed radiometric and therefore incoherent structure. The sixth and final chapter looks at an important and interesting application of spread spectrum to accurately locate a wideband, 'bent pipe', satellite transponder. It is, in a strong sense, an inverted GPS technique. Perspectives in Spread Spectrum serves as an excellent reference and source of ideas for further research, and may be used as a text for advanced courses on the topic. |
You may like...
Guest Book for Wedding - Hardcover…
Honeysuckle Sweet Creations
Hardcover
R561
Discovery Miles 5 610
Innovative Food Processing Technologies…
Kasiviswanathan Muthukumarappan, Kai Knoerzer
Hardcover
R38,876
Discovery Miles 388 760
Cambridge Primary Computing Learner's…
Roland Birbal, Michele Taylor, …
Paperback
R740
Discovery Miles 7 400
Synthesis and Operability Strategies for…
Efstratios N. Pistikopoulos, Yuhe Tian
Paperback
R3,722
Discovery Miles 37 220
Analysis of Clinical Trials Using SAS…
Alex Dmitrienko, Gary G Koch
Hardcover
R2,657
Discovery Miles 26 570
|