0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (9)
  • R250 - R500 (17)
  • R500+ (362)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Learning HTTP/2 (Paperback): Stephen Ludin, Javier Garza Learning HTTP/2 (Paperback)
Stephen Ludin, Javier Garza
R856 R735 Discovery Miles 7 350 Save R121 (14%) Ships in 18 - 22 working days

What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance. You'll take a deep dive into HTTP/2 details, and learn how this updated protocol is changing the web landscape. HTTP/1.1 has been the primary means of communicating data across the web for the past 20 years, but the level of interaction today has gone well beyond what people envisioned in 1997. With this book, authors Stephen Ludin and Javier Garza show you how HTTP/2 will help speed the execution of modern sites and applications. With this book, you'll explore: Performance challenges that led to the HTTP upgrade HTTP/2 in a nutshell, including benefits and transition methods Existing best practices and hacks to improve web performance HTTP/2 support for browsers, servers, proxies, and content delivery networks How the performance of sites using HTTP/2 compares to their HTTP/1.1 experience HTTP/2's effect on specific issues such as latency, packet loss, and Time to First Byte (TTFB)

Wireless Internet Security - Architecture and Protocols (Hardcover): James Kempf Wireless Internet Security - Architecture and Protocols (Hardcover)
James Kempf
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.

Wireless Networks and Mobile Computing (Hardcover): Koushik Sinha, Sasthi C. Ghosh, Bhabani P. Sinha Wireless Networks and Mobile Computing (Hardcover)
Koushik Sinha, Sasthi C. Ghosh, Bhabani P. Sinha
R3,975 Discovery Miles 39 750 Ships in 10 - 15 working days

Wireless communication is one of the fastest growing industry segments today. Many types of wireless networks are now being used for applications such as personal communication, entertainment, rural and urban healthcare, smart home building, inventory control, and surveillance. This book introduces the basic concepts of wireless networks and mobile computing to give engineering students at the undergraduate/graduate level a solid background in the field. It also looks at the latest research and challenging problems in the field to serve as a reference for advanced-level researchers. Wireless Networks and Mobile Computing begins with an introduction to the different types of wireless networks, including Wi-Fi, ZigBee, cellular mobile, ad hoc, cognitive radio, wireless mesh, and wireless sensor. Subsequent chapters address more advanced topics such as: Mobility, bandwidth, and node location management issues in mobile networks Message communication techniques and protocols in ad hoc networks Recent research and future direction of wireless local area networks (WLANs) Deployment of sensor nodes in wireless sensor networks (WSNs) Energy-efficient communication in wireless networks Security aspects of wireless communication The book includes exercises at the end of every chapter to help give students a better insight into the topics presented. It includes a number of advanced-level exercises, which are research problems that may be taken up by researchers in the respective areas. This book provides a valuable reference for classroom study/teaching as well as for technology development and research in the relevant areas.

TCP/IP Essentials - A Lab-Based Approach (Paperback): Shivendra S. Panwar, Shiwen Mao, Jeong-Dong Ryoo, Yihan Li TCP/IP Essentials - A Lab-Based Approach (Paperback)
Shivendra S. Panwar, Shiwen Mao, Jeong-Dong Ryoo, Yihan Li
R1,811 Discovery Miles 18 110 Ships in 10 - 15 working days

The TCP/IP family of protocols have become the de facto standard in the world of networking, are found in virtually all computer communication systems, and form the basis of today's Internet. TCP/IP Essentials is a hands-on guide to TCP/IP technologies, and shows how the protocols are implemented in practice. The book contains a series of extensively tested laboratory experiments that span the various elements of protocol definition and behavior. Topics covered include bridges, routers, LANs, static and dynamic routing, multicast and realtime service, and network management and security. The experiments are described in a Linux environment, with parallel notes on Solaris implementation. The book includes many homework exercises, and supplementary material for instructors is available. The book is aimed at students of electrical and computer engineering and students of computer science taking courses in networking. It is also an ideal guide for engineers studying for networking certifications.

Protocols by Invariants (Paperback, New Ed): Anneke A. Schoone Protocols by Invariants (Paperback, New Ed)
Anneke A. Schoone
R1,324 Discovery Miles 13 240 Ships in 10 - 15 working days

When several computers have to cooperate to achieve a certain task (i.e. distributed computing) we need 'recipes' (i.e. protocols) to tell them what to do. Unfortunately, human minds are not well suited to keeping track of what might happen given even a very simple protocol. In this book Dr Schoone shows how we can derive properties of those protocols that always hold (i.e. invariants), irrespective of what actually happens in an execution of the protocol. From these invariants the basic attributes of the protocols can be obtained. Each protocol is explained intuitively, proved correct using invariants, and analysed to establish the relation between parameter settings and its essential features. The protocols belong to a wide range of layers in the ISO reference model hierarchy, and include the following: a class of communication protocols that tolerate and correct message loss, duplication, and resequencing; protocols for determining and maintaining routing information, both in a static and a dynamic environment; connection-management protocols; and atomic commitment protocols for use in distributed database management.

Communication Protocols - Principles, Methods and Specifications (Paperback, 1st ed. 2020): Drago Hercog Communication Protocols - Principles, Methods and Specifications (Paperback, 1st ed. 2020)
Drago Hercog
R4,040 Discovery Miles 40 400 Ships in 18 - 22 working days

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own

Protocols for Secure Electronic Commerce (Hardcover, 3rd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 3rd edition)
Mostafa Hashem Sherif
R5,854 Discovery Miles 58 540 Ships in 10 - 15 working days

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition: Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication Increases the coverage of PayPal in accordance with PayPal's amplified role for consumers and businesses Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.

Industrial Automation from Scratch - A hands-on guide for using sensors, actuators, PLC, HMI, and SCADA to automate industrial... Industrial Automation from Scratch - A hands-on guide for using sensors, actuators, PLC, HMI, and SCADA to automate industrial processes (Paperback)
Olushola Akande
R1,123 Discovery Miles 11 230 Ships in 18 - 22 working days

Industry 4.0, PLC and VFD wiring and programming made easy with this step-by-step guide that simplifies complex topics in industrial automation Key Features * Everything you need to know about Industrial Automation and Electronics * Learn how to build and monitor a project using SCADA and HMI * Explore emerging wireless technologies such as 5G to build smart factories Book Description By automating processes, industrial automation has become a "Solution" for all types of industries to reduce manual labour inputs and costs. Take a look at this book to discover the abilities you'll need to become an authority in industrial automation. This book will begin by defining Industrial Automation and describing its various forms, levels, and advantages. Various switches, sensors, and actuators will also be discussed. Next, you will learn about the Direct On-Line (DOL) starter and its accompanying components such as the circuit breaker, contactor, and overload relay. As you progress, you'll learn more about VFDs, their parameter settings, and how to wire and programme them for induction motor control. You'll also be able to run simulations to test your software to see if it's working or not. The book also includes a step-by-step guide that introduces other technologies including HMI and SCADA, as well as temperature, pressure, level, and flow measurement and transmitters. The final chapter contains crucial information on Industry 4.0 (Smart Factory) that will be helpful to individuals who need to comprehend the technology. By the end of this book, you will have gained knowledge right from basic to advanced levels of Industrial Automation and be able to design basic automated machines using sensors, actuators, and PLC. What you will learn * Understand industrial automation and its various application * Learn automation parts such as sensors, and motors * Know Industrial Control systems, principles of AC, DC, and Servo motors * Perform troubleshooting procedures on electrical devices * Discover Wireless Communication and network topologies * Explore industrial networks, wired and wireless networks, and 5G * Implement common industrial network protocols. Who This Book Is For The book is for someone who will be an Electronic/Industrial Engineers and IoT engineer, or anyone who wants to know about Industrial automation from scratch. Prior knowledge of Circuits and programming will be required.

T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed): Matthew S. Gast T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed)
Matthew S. Gast
R1,028 Discovery Miles 10 280 Ships in 18 - 22 working days

This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

Evolutionary Algorithms for Mobile Ad hoc Networks (Hardcover): P Dorronsoro Evolutionary Algorithms for Mobile Ad hoc Networks (Hardcover)
P Dorronsoro
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking

Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks--each of these require a designer's keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking.

This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process--allowing designers to put some "intelligence" or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms, topology management, and mobility models to address challenges in the field.

"Evolutionary Algorithms for Mobile Ad Hoc Networks" Instructs on how to identify, model, and optimize solutions to problems that arise in daily researchPresents complete and up-to-date surveys on topics like network and mobility simulatorsProvides sample problems along with solutions/descriptions used to solve each, with performance comparisonsCovers current, relevant issues in mobile networks, like energy use, broadcasting performance, device mobility, and more

"Evolutionary Algorithms for Mobile Ad Hoc Networks" is an ideal book for researchers and students involved in mobile networks, optimization, advanced search techniques, and multi-objective optimization.

Distributed Network Data (Paperback): Alasdair Allan Distributed Network Data (Paperback)
Alasdair Allan; Contributions by Kipp Bradford
R564 Discovery Miles 5 640 Ships in 18 - 22 working days

Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment - including noise level, temperature, and people flow. With this hands-on book, you'll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and off-the-shelf sensors. Authors Alasdair Allan and Kipp Bradford walk you through the entire process, from prototyping a simple sensor node to performing real-time analysis on data captured by a deployed multi-sensor network. Demonstrated at recent O'Reilly Strata Conferences, the future of distributed data is already here. If you have programming experience, you can get started immediately. Wire up a circuit on a breadboard, and use the Arduino to read values from a sensor Add a microphone and infrared motion detector to your circuit Move from breadboard to prototype with Fritzing, a program that converts your circuit design into a graphical representation Simplify your design: learn use cases and limitations for using Arduino pins for power and grounding Build wireless networks with XBee radios and request data from multiple sensor platforms Visualize data from your sensor network with Processing or LabVIEW

SNMP Mastery (Paperback): Michael W Lucas SNMP Mastery (Paperback)
Michael W Lucas
R547 Discovery Miles 5 470 Ships in 18 - 22 working days
Structural Information and Communication Complexity - 23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July... Structural Information and Communication Complexity - 23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July 19-21, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Jukka Suomela
R2,523 Discovery Miles 25 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 23rd International Colloquium on Structural Information and Communication Complexity, SIROCCO 2016, held in Helsinki, Finland in July 2016. The 25 full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized around the following topics: message passing; shared memory; mobile agent; data dissemination and routing.

Wired/Wireless Internet Communications - 13th International Conference, WWIC 2015, Malaga, Spain, May 25-27, 2015, Revised... Wired/Wireless Internet Communications - 13th International Conference, WWIC 2015, Malaga, Spain, May 25-27, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Mari Carmen Aguayo-Torres, Gerardo Gomez, Javier Poncela
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, held in Malaga, Spain, in May 2015. The 31 papers presented in this volume were carefully reviewed and selected from 43 submissions. They focus on the efficient integration of new network approaches with the traditional wired infrastructure. The topics addressed are: design and evaluation of protocols, dynamics of the integration, performance tradeoffs, and the need for new performance metrics and cross-layer interactions.

Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016.... Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings (Paperback, 1st ed. 2016)
Qing Yang, Wei Yu, Yacine Challal
R2,946 Discovery Miles 29 460 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2016, held in Bozeman, MT, USA, in August 2016.The 50 full papers and 9 invited papers presented werde carefully reviewed and selected from 148 submissions. WASA is designed to be a forum for theoreticians, system and application designers, protocol developers and practitioners to discuss and express their views on the current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include, but not limited to, effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

OSPF: A Network Routing Protocol (Paperback, 1st ed.): Phani Raj Tadimety OSPF: A Network Routing Protocol (Paperback, 1st ed.)
Phani Raj Tadimety
R1,466 Discovery Miles 14 660 Ships in 18 - 22 working days

Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra's Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustrations to clarify concepts and enhance the enjoyment of networking. OSPF: A Network Routing Protocol is an absorbing, comprehensible account of OSPF, including the algorithm which is used for calculating its routes. While OSPF has traditionally been an organizational networking protocol, in these exciting times of Software Defined Networking (SDN), it has assumed an important role in the consolidated data center too. Now that the traditional distinctions between server and network roles are getting blurred, everyone in the data center needs to become familiar with networking and networking protocols!

4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their... 4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business (Paperback, 1st ed.)
Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
R1,460 R1,339 Discovery Miles 13 390 Save R121 (8%) Ships in 18 - 22 working days

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development. Fortunately, as you'll discover in this book, LTE is a robust and flexible standard for 4G communications. Operators developing 4G deployment strategies have many options, but they must consider the tradeoffs among them in order to maximize the return on investment for LTE networks. This book will show operators how to develop detailed but flexible deployment road maps incorporating business requirements while allowing the agility that expected and unexpected network evolution require. Such road maps help you avoid costly redeployment while leveraging profitable traffic. Telecommunications experts and authors Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty examine various architectural options provided by the flexibility of LTE and their effect on the general current and future capability of the designed network. They examine specific features of the network, while covering specific architectural deployment strategies through example and then assessing their implications on both near- and long-term operations as well as potential evolutionary paths. Besides helping you understand and communicate network upgrade and architectural evolution road maps (with options), you will learn: How to plan for accessibility, retainability, integrity, availability, and mobility How to balance loads effectively How to manage the constraints arising from regulation and standardization How to manage the many disruptive factors affecting LTE networks 4G: Deployment Strategies and Operational Implications also outlines specific network strategies, which network features and deployment strategies support those strategies, and the trade-offs in business models depending on the strategies chosen. Best of all you will learn a process for proactive management of network road map evolution, ensuring that your network-and your skills-remain robust and relevant as the telecommunications landscape changes.

IPv6 Address Planning (Paperback): Tom Coffeen IPv6 Address Planning (Paperback)
Tom Coffeen
R793 R697 Discovery Miles 6 970 Save R96 (12%) Ships in 18 - 22 working days

With the recent exhaustion of IPv4 in North America, Asia, and Europe (and Latin America later this year), it's official: IPv4 is on life-support and is rapidly on its way to becoming a legacy protocol. Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future.

Along with that adoption comes the need for an IPv6 address plan. This guide provides a comprehensive overview of how to create one. In three sections--preparation, design, and maintenance--enterprise IT network architects, engineers, and administrators will learn the current best-practices for designing, deploying, and maintaining an effective IPv6 addressing plan.

LDAP System Administration (Paperback): Gerald Carter LDAP System Administration (Paperback)
Gerald Carter
R899 R778 Discovery Miles 7 780 Save R121 (13%) Ships in 18 - 22 working days

If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

Getting Started with OpenBTS (Paperback): Michael Ledema Getting Started with OpenBTS (Paperback)
Michael Ledema
R550 Discovery Miles 5 500 Ships in 18 - 22 working days

Deploy your own private mobile network with OpenBTS, the open source software project that converts between the GSM and UMTS wireless radio interface and open IP protocols. With this hands-on, step-by-step guide, you'll learn how to use OpenBTS to construct simple, flexible, and inexpensive mobile networks with software. OpenBTS can distribute any internet connection as a mobile network across a large geographic region, and provide connectivity to remote devices in the Internet of Things. Ideal for telecom and software engineers new to this technology, this book helps you build a basic OpenBTS network with voice and SMS services and data capabilities. From there, you can create your own niche product or experimental feature. Select hardware, and set up a base operating system for your project Configure, troubleshoot, and use performance-tuning techniques Expand to a true multinode mobile network complete with Mobility and Handover Add general packet radio service (GPRS) data connectivity, ideal for IoT devices Build applications on top of the OpenBTS NodeManager control and event APIs

Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research (Paperback, Edition.): Angelos D.... Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research (Paperback, Edition.)
Angelos D. Keromytis
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse.

In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.

Developments in Telecommunications - With a Focus on SS7 Network Reliability (Paperback, Softcover reprint of hardcover 1st ed.... Developments in Telecommunications - With a Focus on SS7 Network Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Gerhard Rufa
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

In this book we summarize important developments in telecommunications with a focus on Signalling System No. 7 (SS 7) network reliability. But why is SS 7 network security and reliability so important? According to the Open Systems Interconnection (OSI) model the term "network" refers to the Layer 3 network service, which is offered by the Message Transfer Part (MTP) and Signalling Connection Control Part (SCCP) to higher layers. An SS 7 network outage results in a breakdown of signalling between the individual nodes of the network, so that telecommunication network services are no longer available to customers. Apart from the tremendous nancial damage to the network operator, the social consequences of such a network breakdown cannot be underestimated. Since the MTP is the central part of the SS 7 network, it is of crucial importance for network security and reliability. The MTP is published in different versions and should now be what we call "stable." Is it really stable? Does it work properly in real networks? Does it t new requirements so that no further changes within the MTP are needed? Various different implementations have existed for a long time and are used in national as well as the international network. Due to this, an objective is not to p- form any further changes within the MTP in order to avoid compatibility problems with existing and running systems. Experience shows that compatibility problems are always related to further development of the MTP.

Application Security for the Android Platform (Paperback): Jeff Six Application Security for the Android Platform (Paperback)
Jeff Six
R502 Discovery Miles 5 020 Ships in 18 - 22 working days

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data.

How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you'll learn how to address real threats to your app, whether or not you have previous experience with security issues. Examine Android's architecture and security model, and how it isolates the filesystem and database Learn how to use Android permissions and restricted system APIs Explore Android component types, and learn how to secure communications in a multi-tier app Use cryptographic tools to protect data stored on an Android device Secure the data transmitted from the device to other parties, including the servers that interact with your app

Basic Sensors in iOS (Paperback): Alasdair Allan Basic Sensors in iOS (Paperback)
Alasdair Allan
R545 Discovery Miles 5 450 Ships in 18 - 22 working days

What really sets the iPhone apart from laptops and PCs is its use of onboard sensors, including those that are location-enabled. This concise book takes experienced iPhone and Mac developers on a detailed tour of iPhone and iPad hardware by explaining how these sensors work, and what they're capable of doing.

With this book, you'll build sample applications for each sensor, and learn hands-on how to take advantage of the data each sensor produces. You'll gain valuable experience that you can immediately put to work inside your own iOS applications for the iPhone, iPod touch, and iPad. This book helps you focus on: Camera: learn how to take pictures and video, create video thumbnails, customize video, and save media to the photo albumAudio: use the media picker controller and access the iPod music library in your own application, and enable your app to record and play sampled audioAccelerometer: write an application that uses this sensor to determine device orientationMagnetometer: learn how this sensor verifies compass headingsCore Motion: use this framework to receive motion data from both the accelerometer and the vibrational gyroscope

This short book is part of a collection that will, along with new material, be compiled into a larger book, iOS Sensor Programming. The other books in this collection are Augmented Reality in iOS, Geolocation in iOS, and iOS Sensor Apps with Arduino.

XMPP (Paperback): Peter Saint-Andre XMPP (Paperback)
Peter Saint-Andre; Contributions by Kevin Smith, Remko Troncon
R901 R779 Discovery Miles 7 790 Save R122 (14%) Ships in 18 - 22 working days

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will:

Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP

Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R873 R792 Discovery Miles 7 920
Ethical Hacking - The Ultimate Guide to…
Lester Evans Hardcover R664 R593 Discovery Miles 5 930
Affordability Issues Surrounding the Use…
Sam Takavarasha Jr, Carl Adams Hardcover R4,902 Discovery Miles 49 020
Computer Programming The Doctrine 2.0…
Adesh Silva Hardcover R698 R621 Discovery Miles 6 210
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Mobile IPv6 - Protocols and…
Qing Li, Tatuya Jinmei, … Paperback R1,418 Discovery Miles 14 180
IoT Protocols and Applications for…
Cristian Gonzalez Garcia, Vicente Garcia Diaz Hardcover R6,648 Discovery Miles 66 480
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton Hardcover R3,164 Discovery Miles 31 640
RFID and Wireless Sensors Using…
Angel Ramos, Antonio Lazaro, … Hardcover R2,463 R2,324 Discovery Miles 23 240

 

Partners