0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (7)
  • R250 - R500 (16)
  • R500+ (357)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed): Matthew S. Gast T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed)
Matthew S. Gast
R1,028 Discovery Miles 10 280 Ships in 18 - 22 working days

This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

Computer Security - ESORICS 2000 - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000... Computer Security - ESORICS 2000 - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings (Paperback, 2000 ed.)
Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Processor Networks and Aspects of the Mapping Problem (Hardcover, New): Peter A. J. Hilbers Processor Networks and Aspects of the Mapping Problem (Hardcover, New)
Peter A. J. Hilbers
R2,165 Discovery Miles 21 650 Ships in 10 - 15 working days

In this 1991 book, Hilbers discusses the general case of how to use processors simultaneously in order to solve a single problem rather than any specific application, and develops a theory independent of particular architectures. He starts by introducing distributed computing with graph theory, and considers processor networks and their price/performance ratios. He goes on to look at obtaining homogeneous distributions of work over networks and considers examples. Finally he discusses message routing within a processor network. This is intended to be a fundamental treatment of the relevant subjects and is aimed at computer scientists and graduate students in computer science who have experience with parallel processing: it will also be useful to others interested in processor networks.

NETWORKING 2000. Broadband Communications, High Performance Networking, and Performance of Communication Networks -... NETWORKING 2000. Broadband Communications, High Performance Networking, and Performance of Communication Networks - IFIP-TC6/European Commission International Conference Paris, France, May 14-19, 2000 Proceedings (Paperback, 2000 ed.)
Guy Pujolle, Harry Perros, Serge Fdida, Ulf Koerner, Ioannis Stavrakakis
R4,203 Discovery Miles 42 030 Ships in 18 - 22 working days

This was the first conference jointly organized by the IFIP Working Groups 6. 2, 6. 3, and 6. 4. Each of these three Working Groups has its own established series of conferences. Working Group 6. 2 sponsors the Broadband Communications series of conferences (Paris 1995, Montreal 1996, Lisboa 1997, Stuttgart 1998, and Hong-Kong 1999). Working Group 6. 3 sponsors the Performance of Communication Systems series of conferences (Paris 1981, Zurich 1984, Rio de Janeiro 1987, Barcelona 1990, Raleigh 1993, Istanbul 1995, and Lund 1998). Working Group 6. 4 sponsors the High Performance Networking series of conferences (Aaren 1987, Liege 1988, Berlin 1990, Liege 1992, Grenoble 1994, Palma 1995, New York 1997, Vienna 1998). It is expected that this new joint conference will take place every two years. In view of the three sponsoring Working Groups, there were three separate tracks, one per Working Group. Each track was handled by a different co chairman. Specifically, the track of Working Group 6. 2 was handled by Ulf Korner, the track of Working Group 6. 3 was handled by Ioanis Stavrakakis, and the track of Working Group 6. 4 was handled by Serge Fdida. The overall program committee chairman was Harry Perros, and the general conference chairman was Guy Pujolle. A total of 209 papers were submitted to the conference of which 82 were accepted. Each paper was submitted to one of the three tracks."

Distributed Network Data (Paperback): Alasdair Allan Distributed Network Data (Paperback)
Alasdair Allan; Contributions by Kipp Bradford
R564 Discovery Miles 5 640 Ships in 18 - 22 working days

Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment - including noise level, temperature, and people flow. With this hands-on book, you'll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and off-the-shelf sensors. Authors Alasdair Allan and Kipp Bradford walk you through the entire process, from prototyping a simple sensor node to performing real-time analysis on data captured by a deployed multi-sensor network. Demonstrated at recent O'Reilly Strata Conferences, the future of distributed data is already here. If you have programming experience, you can get started immediately. Wire up a circuit on a breadboard, and use the Arduino to read values from a sensor Add a microphone and infrared motion detector to your circuit Move from breadboard to prototype with Fritzing, a program that converts your circuit design into a graphical representation Simplify your design: learn use cases and limitations for using Arduino pins for power and grounding Build wireless networks with XBee radios and request data from multiple sensor platforms Visualize data from your sensor network with Processing or LabVIEW

An Introduction to TCP/IP (Paperback, 1st ed. 1988. 3rd printing 1989): John Davidson An Introduction to TCP/IP (Paperback, 1st ed. 1988. 3rd printing 1989)
John Davidson
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This unique and valuable source of information describes the protocol suite according to the International Organization for StandardsISO) seven-level (OSI) reference model. Written by Dr. John Davidson at Ungermann/Bass, the worlds largest manufacturer of local area networks, this book will appeal to everybody interested or involved in local or wide-area computer networking projects.

LISP Network Deployment and Troubleshooting - The Complete Guide to LISP Implementation on IOS-XE, IOS-XR, and NX-OS... LISP Network Deployment and Troubleshooting - The Complete Guide to LISP Implementation on IOS-XE, IOS-XR, and NX-OS (Paperback)
Tarique Shakil, Vinit Jain, Yves Louis
R1,208 Discovery Miles 12 080 Ships in 10 - 15 working days

The LISP overlay protocol helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility. LISP Network Deployment and Troubleshooting is the single source for understanding, configuring and troubleshooting LISP on Cisco IOS, IOS XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to troubleshoot LISP-related issues such as scalability and convergence. Focusing on design and deployment in real production environments, leading Cisco LISP engineers Tarique Shakil and Vinit Jain offer authoritative coverage of deploying LISP, verifying its operation, and optimizing its performance in widely diverse environments. Drawing on their unsurpassed experience supporting LISP deployments, they share detailed configuration examples, templates, and best practices designed to help you succeed with LISP no matter how you intend to use it. Coverage includes: Problems LISP solves, current use cases, and powerful emerging applications Standards and architecture, including control and data planes, packets, messaging, and communication processes LISP IPv4 unicast routing, IPv6 enablement/transition, and multicast LISP mobility in traditional data center and VXLAN fabrics LISP network virtualization and multi-tenancy LISP in the enterprise multi-homed Internet/WAN edge Securing, managing, and automating LISP

Java Network Programming 4ed (Paperback, 4th Revised edition): Elliotte Rusty Harold Java Network Programming 4ed (Paperback, 4th Revised edition)
Elliotte Rusty Harold
R1,253 R1,056 Discovery Miles 10 560 Save R197 (16%) Ships in 18 - 22 working days

This practical guide provides a complete introduction to developing network programs with Java. You'll learn how to use Java's network class library to quickly and easily accomplish common networking tasks such as writing multithreaded servers, encrypting communications, broadcasting to the local network, and posting data to server-side programs. Author Elliotte Rusty Harold provides complete working programs to illustrate the methods and classes he describes. This thoroughly revised fourth edition covers REST, SPDY, asynchronous I/O, and many other recent technologies. Explore protocols that underlie the Internet, such as TCP/IP and UDP/IP Learn how Java's core I/O API handles network input and output Discover how the InetAddress class helps Java programs interact with DNS Locate, identify, and download network resources with Java's URI and URL classes Dive deep into the HTTP protocol, including REST, HTTP headers, and cookies Write servers and network clients, using Java's low-level socket classes Manage many connections at the same time with the nonblocking I/O

TCP/IP Network Administration 3e (Paperback, 3rd Revised edition): Craig Hunt TCP/IP Network Administration 3e (Paperback, 3rd Revised edition)
Craig Hunt
R1,324 R1,127 Discovery Miles 11 270 Save R197 (15%) Ships in 18 - 22 working days

This complete hands-on guide to setting up and running a TCP/IP network starts with the fundamentals: what protocols do and how they work, how addresses and routing are used, and how to set up your network connection. The book also covers advanced routing protocols and provides tutorials on configuring important network services. The expanded third edition includes sections on Samba, Apache web server, network security, and much more.

Practical Machine Learning - Innovations in Recommendation (Paperback): Ted Dunning, Ellen Friedman Practical Machine Learning - Innovations in Recommendation (Paperback)
Ted Dunning, Ellen Friedman
R461 R420 Discovery Miles 4 200 Save R41 (9%) Ships in 18 - 22 working days

Building a simple but powerful recommendation system is much easier than you think. Approachable for all levels of expertise, this report explains innovations that make machine learning practical for business production settings--and demonstrates how even a small-scale development team can design an effective large-scale recommendation system. Apache Mahout committers Ted Dunning and Ellen Friedman walk you through a design that relies on careful simplification. You'll learn how to collect the right data, analyze it with an algorithm from the Mahout library, and then easily deploy the recommender using search technology, such as Apache Solr or Elasticsearch. Powerful and effective, this efficient combination does learning offline and delivers rapid response recommendations in real time. Understand the tradeoffs between simple and complex recommenders Collect user data that tracks user actions--rather than their ratings Predict what a user wants based on behavior by others, using Mahoutfor co-occurrence analysis Use search technology to offer recommendations in real time, complete with item metadata Watch the recommender in action with a music service example Improve your recommender with dithering, multimodal recommendation, and other techniques

LDAP System Administration (Paperback): Gerald Carter LDAP System Administration (Paperback)
Gerald Carter
R899 R778 Discovery Miles 7 780 Save R121 (13%) Ships in 18 - 22 working days

If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

The Future of Wireless Networks - Architectures, Protocols, and Services (Hardcover): Mohesen Guizani, Hsiao--Hwa Chen,... The Future of Wireless Networks - Architectures, Protocols, and Services (Hardcover)
Mohesen Guizani, Hsiao--Hwa Chen, Chonggang Wang
R4,247 Discovery Miles 42 470 Ships in 10 - 15 working days

The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless networks to their capacity. Moreover, it is predicted that mobile data traffic will continue to grow by over 300 percent by 2017. To handle this spectacular growth, the development of improved wireless networks for the future has been of paramount importance. The Future of Wireless Networks: Architectures, Protocols, and Services discusses the future of wireless networks, including the emerging network architectures, underlying protocols, services, and applications. The first part of the book focuses on new wireless network architectures that are being developed, such as mobile SDN, wireless local area networks (i.e., 802.11), and wireless sensor networks for the Smart Grid. In the second part of the book, the authors discuss the new protocols and enabling technologies for the different wireless network architectures. These include wireless MAC protocols, resource allocation in cognitive radio networks, multicast transmission, and femtocells, which provide enhanced indoor coverage and increased network capacity. The book's final section discusses several new services and applications that are springing up, such as multisource selection for wireless peer-to-peer (P2P) networks and device-to-device (D2D) content sharing, which reduces duplicated downloads of the same contents on cellular links by offloading the traffic onto other networks. This section also covers the next generation of wireless security and privacy control techniques that service providers can use to ensure that their infrastructures and services are adequately protected against all kinds of threats.

Getting Started with OpenBTS (Paperback): Michael Ledema Getting Started with OpenBTS (Paperback)
Michael Ledema
R550 Discovery Miles 5 500 Ships in 18 - 22 working days

Deploy your own private mobile network with OpenBTS, the open source software project that converts between the GSM and UMTS wireless radio interface and open IP protocols. With this hands-on, step-by-step guide, you'll learn how to use OpenBTS to construct simple, flexible, and inexpensive mobile networks with software. OpenBTS can distribute any internet connection as a mobile network across a large geographic region, and provide connectivity to remote devices in the Internet of Things. Ideal for telecom and software engineers new to this technology, this book helps you build a basic OpenBTS network with voice and SMS services and data capabilities. From there, you can create your own niche product or experimental feature. Select hardware, and set up a base operating system for your project Configure, troubleshoot, and use performance-tuning techniques Expand to a true multinode mobile network complete with Mobility and Handover Add general packet radio service (GPRS) data connectivity, ideal for IoT devices Build applications on top of the OpenBTS NodeManager control and event APIs

Professional XMPP Programming with JavaScript and jQuery (Paperback): J Moffitt Professional XMPP Programming with JavaScript and jQuery (Paperback)
J Moffitt 1
R1,334 Discovery Miles 13 340 Ships in 18 - 22 working days

Create real-time, highly interactive apps quickly with the powerful XMPP protocol

XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search. This book teaches you how to harness the power of XMPP in your own apps and presents you with all the tools you need to build the next generation of apps using XMPP or add new features to your current apps. Featuring the JavaScript language throughout and making use of the jQuery library, the book contains several XMPP apps of increasing complexity that serve as ideal learning tools.

Coverage Includes: Getting to Know XMPPDesigning XMPP ApplicationsSaying Hello: The First ApplicationExploring the XMPP Protocol: A Debugging ConsoleMicroblogging in Real Time: An Identica ClientTalking with Friends: One-on-One ChatExploring Services: Service Discovery and BrowsingGroup Chatting: A Multi-User Chat ClientPublishing and Subscribing: A Shared Sketch Pad IntroductionWriting with Friends: A Collaborative Text EditorPlaying Games: Head to Head Tic-Tac-ToeGetting Attached: Bootstrapping BOSHDeploying XMPP ApplicationsWriting Strophe Plug-ins

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Application Security for the Android Platform (Paperback): Jeff Six Application Security for the Android Platform (Paperback)
Jeff Six
R502 Discovery Miles 5 020 Ships in 18 - 22 working days

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data.

How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you'll learn how to address real threats to your app, whether or not you have previous experience with security issues. Examine Android's architecture and security model, and how it isolates the filesystem and database Learn how to use Android permissions and restricted system APIs Explore Android component types, and learn how to secure communications in a multi-tier app Use cryptographic tools to protect data stored on an Android device Secure the data transmitted from the device to other parties, including the servers that interact with your app

Basic Sensors in iOS (Paperback): Alasdair Allan Basic Sensors in iOS (Paperback)
Alasdair Allan
R545 Discovery Miles 5 450 Ships in 18 - 22 working days

What really sets the iPhone apart from laptops and PCs is its use of onboard sensors, including those that are location-enabled. This concise book takes experienced iPhone and Mac developers on a detailed tour of iPhone and iPad hardware by explaining how these sensors work, and what they're capable of doing.

With this book, you'll build sample applications for each sensor, and learn hands-on how to take advantage of the data each sensor produces. You'll gain valuable experience that you can immediately put to work inside your own iOS applications for the iPhone, iPod touch, and iPad. This book helps you focus on: Camera: learn how to take pictures and video, create video thumbnails, customize video, and save media to the photo albumAudio: use the media picker controller and access the iPod music library in your own application, and enable your app to record and play sampled audioAccelerometer: write an application that uses this sensor to determine device orientationMagnetometer: learn how this sensor verifies compass headingsCore Motion: use this framework to receive motion data from both the accelerometer and the vibrational gyroscope

This short book is part of a collection that will, along with new material, be compiled into a larger book, iOS Sensor Programming. The other books in this collection are Augmented Reality in iOS, Geolocation in iOS, and iOS Sensor Apps with Arduino.

XMPP (Paperback): Peter Saint-Andre XMPP (Paperback)
Peter Saint-Andre; Contributions by Kevin Smith, Remko Troncon
R901 R779 Discovery Miles 7 790 Save R122 (14%) Ships in 18 - 22 working days

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will:

Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP

Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.

Advances in Wireless Communications and Applications - Smart Wireless Communications: Algorithms and Network Technologies,... Advances in Wireless Communications and Applications - Smart Wireless Communications: Algorithms and Network Technologies, Proceedings of 5th ICWCA 2021 (Hardcover, 1st ed. 2023)
Lakhmi C. Jain, Roumen Kountchev, Kun Zhang, Roumiana Kountcheva
R5,358 Discovery Miles 53 580 Ships in 10 - 15 working days

This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithms and network technologies in smart communications, with application in underwater communications, IoT-based marine surface communications as well as state-of-the-art real-time precise location technologies, Wi-Fi/Bluetooth locationing, array signal processing, and many others.

VoIP Hacks - Tips And Tools For Internet Telephony (Paperback): Thoeodore Wallingford VoIP Hacks - Tips And Tools For Internet Telephony (Paperback)
Thoeodore Wallingford
R688 R617 Discovery Miles 6 170 Save R71 (10%) Ships in 18 - 22 working days

Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies. VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for: * gauging VoIP readiness on an enterprise network * using SIP, H.3 23, and other signaling specifications * providing low-layer security in a VoIP environment * employing IP hardphones, analog telephone adapters, and softPBX servers * dealing with and avoiding the most common VoIP deployment mistakes In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.

Switching to VoIP (Paperback): Theodore Wallingford Switching to VoIP (Paperback)
Theodore Wallingford
R938 R817 Discovery Miles 8 170 Save R121 (13%) Ships in 18 - 22 working days

More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP.

VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers

businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm.

Developed from real-world experience by a senior developer, O'Reilly's "Switching to VoIP" provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll

discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed andprojects presented:

building a softPBX

configuring IP phones

ensuring quality of service

scalability

standards-compliance

topological considerations

coordinating a complete system ?switchover?

migrating applications like voicemail and directory

services

retro-interfacing to traditional telephony

supporting mobile users

security and survivability

dealing with the challenges of NAT

To help you grasp the core principles at work, "Switching to VoIP" uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium.

You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. "Switching to VoIP" remains vendor-neutral and advocates standards, not brands. Some of the standards explored include:

SIP

H.323, SCCP, and IAX

Voice codecs

802.3af

Type of Service, IP precedence, DiffServ, and RSVP

802.1a/b/g WLAN

If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.

Network Troubleshooting Tools (Book, 1st ed): Joseph D. Sloan Network Troubleshooting Tools (Book, 1st ed)
Joseph D. Sloan
R1,258 Discovery Miles 12 580 Ships in 18 - 22 working days

Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones that are best for your needs. It also shows you how to approach network troubleshooting using these tools, how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise so you can solve them more effectively.

VoIP For Dummies (Paperback): TV Kelly VoIP For Dummies (Paperback)
TV Kelly
R710 R639 Discovery Miles 6 390 Save R71 (10%) Ships in 18 - 22 working days

Put your phone system on your computer network and see the savings. See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. Using this work: discover how to Use VoIP for your business or home phone service, choose the best network type, set up VoIP on a wireless network, understand transports and services, and demonstrate VoIP's advantages to management.

Getting Started with Bluetooth Low Energy (Paperback): Kevin Townsend, Carles Cufi Akiba, Robert Davidson Getting Started with Bluetooth Low Energy (Paperback)
Kevin Townsend, Carles Cufi Akiba, Robert Davidson
R996 R826 Discovery Miles 8 260 Save R170 (17%) Ships in 9 - 17 working days

With Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems. This book provides a solid, high-level overview of how devices use BLE to communicate with each other. You'll learn useful low-cost tools for developing and testing BLE-enabled mobile apps and embedded firmware and get examples using various development platforms including iOS and Android for app developers and embedded platforms for product designers and hardware engineers. Understand how data is organized and transferred by BLE devices Explore BLEs concepts, key limitations, and network topology Dig into the protocol stack to grasp how and why BLE operates Learn how BLE devices discover each other and establish secure connections Set up the tools and infrastructure for BLE application development Get examples for connecting BLE to iPhones, iPads, Android devices, and sensors Develop code for a simple device that transmits heart rate data to a mobile device

MQTT Essentials - A Lightweight IoT Protocol (Paperback): Gaston C Hillar MQTT Essentials - A Lightweight IoT Protocol (Paperback)
Gaston C Hillar
R1,073 Discovery Miles 10 730 Ships in 18 - 22 working days

Send and receive messages with the MQTT protocol for your IoT solutions. About This Book * Make your connected devices less prone to attackers by understanding practical security mechanisms * Dive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examples * Learn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examples Who This Book Is For This book is a great resource for developers who want to learn more about the MQTT protocol to apply it to their individual IoT projects. Prior knowledge of working with IoT devices is essential. What You Will Learn * Understand how MQTTv3.1 and v3.1.1 works in detail * Install and secure a Mosquitto MQTT broker by following best practices * Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate * Explore the features included in MQTT for IoT and Machine-to-Machine communications * Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js * Implement the security best practices while setting up the MQTT Mosquitto broker In Detail This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages Style and approach This step-by-step guide describes the MQTT protocol for your IoT projects

Protocols for Secure Electronic Commerce (Hardcover, 3rd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 3rd edition)
Mostafa Hashem Sherif
R5,854 Discovery Miles 58 540 Ships in 10 - 15 working days

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition: Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication Increases the coverage of PayPal in accordance with PayPal's amplified role for consumers and businesses Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Geometry, Algebra, Number Theory, and…
Amir Akbary, Sanoli Gun Hardcover R4,104 Discovery Miles 41 040
Migrating to Swift from Flash and…
Radoslava Leseva Adams, Hristo Lesev Paperback R1,398 Discovery Miles 13 980
Dirichlet - A Mathematical Biography
Uta C. Merzbach Hardcover R3,677 Discovery Miles 36 770
Combinatorial Number Theory…
Aviezri S Fraenkel, Daniel A Goldston, … Hardcover R5,385 Discovery Miles 53 850
Partitions, q-Series, and Modular Forms
Krishnaswami Alladi, Frank Garvan Hardcover R4,634 Discovery Miles 46 340
Borel's Methods of Summability - Theory…
Bruce L.R. Shawyer, Bruce Watson Hardcover R2,770 Discovery Miles 27 700
Test-Driven Development in Swift…
Gio Lodi Paperback R1,193 R996 Discovery Miles 9 960
iOS Architecture Patterns - MVC, MVP…
Raul Garcia Paperback R1,308 R1,087 Discovery Miles 10 870
Families of Automorphic Forms and the…
Werner Muller, Sug Woo Shin, … Hardcover R5,928 Discovery Miles 59 280
Core Data in Swift
Marcus Zarra Paperback R1,003 R762 Discovery Miles 7 620

 

Partners