0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (824)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Hardcover)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

E-Technologies - 6th International Conference, MCETECH 2015, Montreal, QC, Canada, May 12-15, 2015, Proceedings (Paperback,... E-Technologies - 6th International Conference, MCETECH 2015, Montreal, QC, Canada, May 12-15, 2015, Proceedings (Paperback, 2015 ed.)
Morad Benyoucef, Michael Weiss, Hafedh Mili
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on E-Technologies, MCETECH 2015, held in Montreal, Canada, in May 2015. The 18 papers presented in this volume were carefully reviewed and selected from 42 submissions. They have been organized in topical sections on process adaptation; legal issues; social computing; eHealth; and eBusiness, eEducation and eLogistics.

World Class Maintenance Management - The 12 Disciplines (Paperback): Rolly Angeles, Charles Robert Nelms World Class Maintenance Management - The 12 Disciplines (Paperback)
Rolly Angeles, Charles Robert Nelms
R1,822 Discovery Miles 18 220 Ships in 18 - 22 working days
Linux System Administration Recipes - A Problem-Solution Approach (Paperback, 1st ed.): Juliet Kemp Linux System Administration Recipes - A Problem-Solution Approach (Paperback, 1st ed.)
Juliet Kemp
R803 R707 Discovery Miles 7 070 Save R96 (12%) Ships in 18 - 22 working days

The job of Linux systems administrator is interrupt-driven and requires constant learning in byte-wise chunks. This book gives solutions to modern problemseven some you might not have heard ofsuch as scripting LDAP, making Mac clients play nice with Linux servers, and backup, security, and recovery scripts. Author Juliet Kemp takes a broad approach to scripting using Perl and bash, and all scripts work on Debian or Red Hat lineage distributions. Plus, she dispenses wisdom about time management, dealing with desperate colleagues, and how to avoid reinventing the wheel Learn how to love LDAP scripting and NFS tuning Make Perl serve you: don't be enslaved by Perl Learn to change, craft, and feel empowered by recipes that change your life What you'll learn Centralize your network using LDAP and NFS Speak the language of different file systems Know when to use Perl or when to stick to sed and awk Treat security concerns with Perl, bash, and intelligence Learn how to trace errant system calls and misbehaving colleagues Who this book is for

System administrators in need of quick succor and guidance when interruptions prevent the smooth running of a network. Table of Contents Saving Yourself Effort Centralizing Your Network: Kerberos, LDAP, and NFS Monitoring and Updating Taking Backups and Managing Data Working with Filesystems Securing Your Systems Working with Apache Using the Command Line Better Working with Text in Files Things Going In, Things Going Out Tracking Down Bugs Managing Time and People

Automating Linux and Unix System Administration (Paperback, 2nd ed.): Nathan Campi, Kirk Bauer Automating Linux and Unix System Administration (Paperback, 2nd ed.)
Nathan Campi, Kirk Bauer
R1,157 R985 Discovery Miles 9 850 Save R172 (15%) Ships in 18 - 22 working days

Whether you need a network of ten Linux PCs and a server or a data center with a few thousand UNIX nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer. Automating Linux and Unix System Administration, Second Edition is unique in its focus on how to make the system administrator's job easier and more efficient: instead of just managing the system administrator's time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully.Both new and seasoned professionals will profit from industryleading insights into the automation process. System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation. After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux data center to a small office network. What you'll learn

See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner. Learn how to automate things correctly so you only have to do it once, by leveraging the authors' experience in setting up small, medium, and large networks. Set up a Linux data center or a network correctly. Explore handling realworld environments where not all hosts are configured alike via a case study of a fictional new data center build-out. Examine realworld examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment. Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book. Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.). Who this book is for

This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks--regardless of network or data center size--in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.

Business Process Management (Paperback): Akhil Kumar Business Process Management (Paperback)
Akhil Kumar
R2,011 Discovery Miles 20 110 Ships in 10 - 15 working days

This book introduces students to business process management, an approach that aims to align the organization's business processes with the demands of the marketplace. Processes serve as a coordination mechanism, and the aim of business process management is to improve the organization's effectiveness and efficiency in adapting to change, and maintaining competitive advantage. In Business Process Management, Kumar argues for the value of looking at businesses as a collection of processes that cut across departments, and for breaking down functional silos. The book provides an overview of the basic concepts in this field before moving on to more advanced topics such as process verification, flexible processes, process security and evaluation, resource assignment, and social networks. One chapter of the book is also devoted to process analytics. The book concludes with an examination of the future directions of the discipline. Blending a strong grounding in current research with a focus on concepts and tools, Business Process Management is an accessible textbook full of practical examples and cases that will appeal to upper level students.

Cyberspace and Cybersecurity (Hardcover, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Hardcover, 2nd edition)
George Kostopoulos
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover): Pethuru Raj, Anupama C. Raman The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover)
Pethuru Raj, Anupama C. Raman
R4,093 Discovery Miles 40 930 Ships in 10 - 15 working days

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.

Representing Organization - Knowledge, Management, and the Information Age (Paperback, New): Simon Lilley, Geoffrey Lightfoot,... Representing Organization - Knowledge, Management, and the Information Age (Paperback, New)
Simon Lilley, Geoffrey Lightfoot, Paulo Amaral M. N.
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

An accessible theoretical analysis of the organizational impact of information technologies. This book examines the many ways in which actors, organizations and technologies are represented through these technologies thus bridging the gap between the abstractions of current theories of organization and the somewhat excessively grounded material on information systems.

From Control To Drift - The Dynamics Of Corporate Information Infrastructures (Paperback, Revised): Claudio U. Ciborra From Control To Drift - The Dynamics Of Corporate Information Infrastructures (Paperback, Revised)
Claudio U. Ciborra
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

Firms are investing considerable resources to create large information infrastructures able to fulfil their varied information-processing and communication needs.

The more the drive towards globalization, the more such infrastructures become crucial. The "wiring" of the corporation should be done in a way that is aligned with its corporate strategy - it is global and generates value.

This book presents six in-depth case studies of large corporations - AstraZeneca, IBM, Norsk Hydro, Roche, SKF, and Statoil - which offer a picture of the main issues involved in information infrastructure implementation and management. Far from being a linear process, the use of the information infrastructure is in fact an open-ended process, in many cases out of control.

Current management models and consulting advice do not seem to be able to cope with such a business landscape. This book provides the reader with interpretations and theories that can foster a different understanding and approach.

T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed): Matthew S. Gast T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed)
Matthew S. Gast
R1,028 Discovery Miles 10 280 Ships in 18 - 22 working days

This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

Business Intelligence for Small and Medium-Sized Enterprises - An Agile Roadmap toward Business Sustainability (Hardcover):... Business Intelligence for Small and Medium-Sized Enterprises - An Agile Roadmap toward Business Sustainability (Hardcover)
Lila Rao-Graham, Maurice L. McNaughton, Gunjan Mansingh
R2,280 Discovery Miles 22 800 Ships in 10 - 15 working days

Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations. With online analytical processing (OLAP), organizations have also established the capability to extract internal and external data from a variety of sources to specifically obtain intelligence about non-routine and often less-structured arrangements. BI therefore refers to applications and technologies that are used to gather, provide access to, and analyze data and information about the operations of an organization. It has the capability of providing comprehensive insight into the more volatile factors affecting the business and its operations, thereby facilitating enhanced decision-making quality and contributing to the creation of business value. Larger and more sophisticated organizations have long been exploiting these capabilities. Business Intelligence for Small and Medium-Sized Enterprises (SMEs) guides SMEs in replicating this experience to provide an agile roadmap toward business sustainability. The book points out that successful BI implementations have generated significant increases in revenue and cost savings, however, the failure rates are also very high. More importantly, it emphasizes that a full range of BI capabilities is not the exclusive purview of large organizations. It shows how SMEs make extensive use of BI techniques to develop the kind of agility endowing them with the organizational capability to sense and respond to opportunities and threats in an increasingly dynamic business environment. It points to the way to a market environment in which smaller organizations could have a larger role. In particular, the book explains that by establishing the agility to leverage internal and external data and information assets, SMEs can enhance their competitiveness by having a comprehensive understanding of the key to an agile roadmap for business sustainability.

Biology and Ecology of the Brown and Sea Trout - State of the Art and Research Themes (Paperback, 1999 ed.): J.L. Bagliniere,... Biology and Ecology of the Brown and Sea Trout - State of the Art and Research Themes (Paperback, 1999 ed.)
J.L. Bagliniere, Gerard Maisse
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

This book contains a collection of 24 state-of-the-art contributions in the area of Information Systems Engineering. It was compiled as a tribute to Professor Janis Bubenko on the occasion of his retirement from the University of Stockholm in February 2000. The contributions are arranged in three sections: - Information Society, with such subjects as B2B E-Commerce, human imperfection, stream data management and enterprise modeling - Approaches to Information Systems Engineering, discussing data warehouse development, web-enabled methods, reuse, and meta-data - Concepts for Information Systems, on more fundamental notions such as time, abstraction, co-operation, intention and information All the contributors are well-known and highly reputed scholars in the area of Information Systems Engineering from all over the world.

The Data Model Resource Book Volume 2 - A Library of Universal Data Models by Industry Types (Paperback, Rev ed): Len Silverston The Data Model Resource Book Volume 2 - A Library of Universal Data Models by Industry Types (Paperback, Rev ed)
Len Silverston
R1,702 Discovery Miles 17 020 Ships in 9 - 17 working days

A quick and reliable way to build proven databases for core business functions
Industry experts raved about The Data Model Resource Book when it was first published in March 1997 because it provided a simple, cost-effective way to design databases for core business functions. Len Silverston has now revised and updated the hugely successful First Edition, while adding a companion volume to take care of more specific requirements of different businesses. Each volume is accompanied by a CD-ROM, which is sold separately. Each CD-ROM provides powerful design templates discussed in the books in a ready-to-use electronic format, allowing companies and individuals to develop the databases they need at a fraction of the cost and a third of the time it would take to build them from scratch.
With each business function boasting its own directory, this CD-ROM provides a variety of data models for specific implementations in such areas as financial services, insurance, retail, healthcare, universities, and telecom.

Network Science (Hardcover): Albert-Laszlo Barabasi Network Science (Hardcover)
Albert-Laszlo Barabasi; As told to Marton Posfai
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network science.

Quick Changeover for Operators - The SMED System (Paperback): Shigeo Shingo Quick Changeover for Operators - The SMED System (Paperback)
Shigeo Shingo
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

The powerful knowledge contained in this book can make your workplace more productive, your job simpler, and everything more satisfying. It's about how to do equipment or product changeovers in record time--often in less than 10 minutes. The method you'll learn here is called SMED, short for "Single-Minute Exchange of Die" (the "single" here means a single-digit number of minutes).

Developed from a longer book, "A Revolution in Manufacturing: The SMED System" (cat no. PP9903), written for managers, this book is written for frontline production and assembly associates. It presents an overview of the reasons why SMED is important for companies and employees, sets out the three basic stages of SMED, and then devotes a separate chapter to each of these stages. The first chapter of the book is like an "owner's manual" that tells you how to get the most out of your reading time by using the margin assists, summaries, and other features of the book to help pull out exactly what you need.

One of the most effective ways to use this book is to read and discuss it with other employees. The authors planned the book so that it can be used this way, organizing the book into chunks of information that can be covered in a series of short sessions. Each chapter includes reflection questions to stimulate group discussion. A "Learning Package "is also available (catalog no.PP7126), which includes a leader's guide, overhead transparencies to summarize major points, and color slides showing examples of SMED applications in different kinds of companies.

PgMP Exam Practice Test and Study Guide (Paperback, 4th edition): Ginger Levin, J. LeRoy Ward PgMP Exam Practice Test and Study Guide (Paperback, 4th edition)
Ginger Levin, J. LeRoy Ward
R2,205 Discovery Miles 22 050 Ships in 10 - 15 working days

PgMP (R) Exam Practice Test and Study Guide, Fourth Edition is the book you need to pass the Program Management Professional (PgMP (R)) exam the first time around. It reflects recent revisions based on PMI (R)'s Standard for Program Management - Third Edition (2013).Based on best practices that complement PMI (R)'s standards, this is the most comprehensive and up-to-date resource available to help you prepare for the exam with new and changed terminology. It includes a list of the major topics covered on the exam organized by the five performance domains-strategic program management, program life cycle, benefits management, stakeholder management, and governance-as presented in the Program Management Professional Examination Content Outline. It also includes helpful tips on how to make the most of the time you have available to prepare for the exam. Just like its bestselling predecessors, this indispensable study guide includes 20 multiple-choice practice questions for each domain along with a comprehensive answer key. The program life cycle domain includes 20 questions for each of the five phases. Each question also has a plainly written rationale for each correct answer with bibliographic references for further study. Two challenging, 170-question practice tests that simulate the actual exam are included in the book and online, so you can retake them as many times as necessary. They also include a rationale and reference. Scores for the online tests are presented as if each question is rated similarly, but this edition also includes a new component: the authors' own weighting system for the level of difficulty for each question. This system will show you what they feel meets the exam's criteria for Proficient, Moderately Proficient, and below Proficient. You then will see your scores by domain in both approaches. Supplying an insider's look at the questions, terminology, and sentence construction you will encounter on the day of the exam, this indispensable study tool is designed to help you pass the exam and achieve the highly sought after PgMP (R) certification.

Administering Exchange Server 2000 (Paperback): Mitch Tulloch Administering Exchange Server 2000 (Paperback)
Mitch Tulloch
R1,256 R1,064 Discovery Miles 10 640 Save R192 (15%) Ships in 18 - 22 working days

Install, configure, and manage Microsoft's Exchange 2000 Server

Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also covers the new features of Exchange, such as Active Directory integration, the Windows 2000 security model, instant messaging, and video conferencing services. The step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots make this the perfect day-to-day reference for administrators working with or migrating to Exchange 2000 Server.


*Use MMC and Terminal Services to administer Exchange
*Create and configure mail-enabled users
*Configure Outlook for Exchange
*Create and modify recipient policies
*Enable support for administrative groups
*Create storage groups and mailbox stores
*Create and replicate public folders
*Build and populate an index
*Apply system policies
*Enable routing groups and configure connectors
*Control virtual servers
*Enable and configure monitors, notifications, protocol logging, and message tracking
*Back up and troubleshoot Exchange

Administering Active Directory (Paperback): Mark Wilkins Administering Active Directory (Paperback)
Mark Wilkins
R1,251 R1,060 Discovery Miles 10 600 Save R191 (15%) Ships in 18 - 22 working days

Configure, manage, and optimize Active Directory on your Windows 2000 network

Deploy and administer a distributed, interoperable, and secure Windows 2000 directory system using Active Directory and this hands-on resource. Administering Active Directory explains how to configure and implement Active Directory as your enterprise directory service and improve network performance. You'll learn to use the core AD components and services, including DNS, replication, and group policy, and take advantage of the centralized management capabilities. With step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots, this is the ideal desktop reference to Active Directory-the fully integrated directory service feature at the heart of Windows 2000.

  • Understand Active Directory architecture and hierarchy
  • Manage user accounts and group resources
  • Integrate DNS with LDAP and WINS
  • Create and manage domain trees and forests
  • Manage the Active Directory replication process
  • Configure site links
  • Troubleshoot and optimize Active Directory
  • Back up and restore your AD servers
  • Implement an Active Directory naming strategy
  • Design schema policy
  • Handle a multiple domain administration
  • Use group policy for efficient administration of network resources
  • Analyze and design a complete Active Directory topology
  • Migrate from Windows NT 4.0 to Windows 2000
Global Software Development Handbook (Hardcover): Raghvinder Sangwan, Matthew Bass, Neel Mullick, Daniel J. Paulish, Juergen... Global Software Development Handbook (Hardcover)
Raghvinder Sangwan, Matthew Bass, Neel Mullick, Daniel J. Paulish, Juergen Kazmeier
R3,085 Discovery Miles 30 850 Ships in 10 - 15 working days

Economics and technology have dramatically re-shaped the landscape of software development. It is no longer uncommon to find a software development team dispersed across countries or continents. Geographically distributed development challenges the ability to clearly communicate, enforce standards, ensure quality levels, and coordinate tasks. Global Software Development Handbook explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The book introduces techniques proven successful at international electronics and software giant Siemens AG. It shows how this multinational uses a high-level process framework that balances agility and discipline for globally distributed software development. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. The handbook explores the issues surrounding quality and the processes required to realize quality in a distributed environment. Communication is a tremendous challenge, especially for teams separated by several time zones, and the authors elucidate how to uncover patterns of communication among these teams to determine effective strategies for managing communication. The authors analyze successful and failed projects and apply this information to how a project can be successful with distributed teams. They also provide lightweight processes that can be dynamically adapted to the demands of any project.

Juniper MX Series 2e (Paperback, 2nd Revised edition): Douglas Hanks, Harry Reynolds Juniper MX Series 2e (Paperback, 2nd Revised edition)
Douglas Hanks, Harry Reynolds
R1,879 Discovery Miles 18 790 Ships in 18 - 22 working days

Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX-Juniper MX's virtual instance. Discover Junos architecture, MX chassis, and Trio Linecards Work with Juniper MX's bridging, VLAN VXLAN, and virtual switches Create a firewall filter framework and discover the latest flexible filtering options Secure your router and add an extra layer of security with Junos DDOS protection and SCFD feature Discover the advantages of hierarchical scheduling, ingress queuing, and flexible remarking Combine Juniper MX routers, using a virtual chassis or MC-LAG Understand and use classical and advanced Trio Chipset's load balancing features Dive into Trio inline services such as inline NAT, redundant logical tunnel, or filter-based GRE tunnel Discover vMX internal architecture and explore the benefits and typical use case of a virtual router

Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September... Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010. Proceedings (Paperback, Edition.)
Tai-Hoon Kim, Adrian Stoica, Ruay-Shiung Chang
R2,755 Discovery Miles 27 550 Ships in 18 - 22 working days

Security-enriched urban computing and smart grids are areas that attracted many a- demic and industry professionals to research and develop. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of urban computing and the smart grid. This conference includes the following special sessions: Signal Processing, Image Processing, Pattern Recognition and Communications (SIPC 2010), Networking, Fault-tolerance and Security For Distributed Computing Systems (NFSDCS 2010), Security Technology Application (STA 2010), Electric Transportation (ElecTrans 2010), Techniques of Bi-directional Power Computing in High Voltage Power Supply (TBPC 2010), Low Power IT and Applications (LPITA 2010), Computational Intel- gence and Soft Computing (CISC 2010), Distributed Computing and Sensor Networks (DCSN 2010), Advanced Fusion IT (AFIT 2010), Social Media and Social Netwo- ing (SMSN 2010), Software Engineering and Medical Information Engineering (SEMIE 2010), Human-Centered Advanced Research/Education (HuCARE 2010), Database Integrity and Security (DIS 2010), Ubiquitous IT Application (UITA 2010) and Smart Grid Applications (SGA 2010). We would like to express our gratitude to all of the authors of the submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future.

Istio: Up and Running - Using a Service Mesh to Connect, Secure, Control, and Observe (Paperback): Lee Calcote, Zack Butcher Istio: Up and Running - Using a Service Mesh to Connect, Secure, Control, and Observe (Paperback)
Lee Calcote, Zack Butcher
R1,208 R1,007 Discovery Miles 10 070 Save R201 (17%) Ships in 18 - 22 working days

You did it. You successfully transformed your application into a microservices architecture. But now that you're running services across different environments-public to public, private to public, virtual machine to container-your cloud native software is beginning to encounter reliability issues. How do you stay on top of this ever-increasing complexity? With the Istio service mesh, you'll be able to manage traffic, control access, monitor, report, get telemetry data, manage quota, trace, and more with resilience across your microservice. In this book, Lee Calcote and Zack Butcher explain why your services need a service mesh and demonstrate step-by-step how Istio fits into the life cycle of a distributed application. You'll learn about the tools and APIs for enabling and managing many of the features found in Istio. Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support

Anti Patterns - Refactoring Software, Architectures & Projects in Crisis (Paperback): W.J. Brown Anti Patterns - Refactoring Software, Architectures & Projects in Crisis (Paperback)
W.J. Brown
R1,501 R1,239 Discovery Miles 12 390 Save R262 (17%) Ships in 18 - 22 working days

"The AntiPatterns authors have clearly been there and done that when it comes to managing software development efforts. I resonated with one insight after another, having witnessed too many wayward projects myself. The experience in this book is palpable." —John Vlissides, IBM Research "This book allows managers, architects, and developers to learn from the painful mistakes of others. The high-level AntiPatterns on software architecture are a particularly valuable contribution to software engineering. Highly recommended!" —Kyle Brown Author of The Design Patterns Smalltalk Companion "AntiPatterns continues the trend started in Design Patterns. The authors have discovered and named common problem situations resulting from poor management or architecture control, mistakes which most experienced practitioners will recognize. Should you find yourself with one of the AntiPatterns, they even provide some clues on how to get yourself out of the situation." —Gerard Meszaros, Chief Architect, Object Systems Group Are you headed into the software development mine field? Follow someone if you can, but if you’re on your own—better get the map! AntiPatterns is the map. This book helps you navigate through today’s dangerous software development projects. Just look at the statistics:

  • Nearly one-third of all software projects are cancelled.
  • Two-thirds of all software projects encounter cost overruns in excess of 200%.
  • Over 80% of all software projects are deemed failures.
While patterns help you to identify and implement procedures, designs, and codes that work, AntiPatterns do the exact opposite; they let you zero-in on the development detonators, architectural tripwires, and personality booby traps that can spell doom for your project. Written by an all-star team of object-oriented systems developers, AntiPatterns identifies 40 of the most common AntiPatterns in the areas of software development, architecture, and project management. The authors then show you how to detect and defuse AntiPatterns as well as supply refactored solutions for each AntiPattern presented.
Flows in Networks (Hardcover): Lester Randolph Ford, D. R. Fulkerson Flows in Networks (Hardcover)
Lester Randolph Ford, D. R. Fulkerson
R3,030 Discovery Miles 30 300 Ships in 18 - 22 working days

This book presents simple, elegant methods for dealing, both in theory and in application, with a variety of problems that have formulations in terms of flows in capacity-constrained networks. Since the theoretical considerations lead in all cases to computationally efficient solution procedures, the hook provides a common meeting ground for persons interested in operations research, industrial and communications engineering, or combinatorial mathematics. Originally published in 1962. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Auditing Information Systems
Mario Piattini Paperback R3,545 Discovery Miles 35 450
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier Hardcover R1,831 Discovery Miles 18 310
Systems Thinkers
Magnus Ramage, Karen Shipp Paperback R1,966 R1,858 Discovery Miles 18 580
Autonomic Network Management Principles…
Nazim Agoulmine Paperback R1,840 Discovery Miles 18 400
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Reliability - A Shared Responsibility…
Rolly Angeles Hardcover R2,070 Discovery Miles 20 700
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel Paperback R777 Discovery Miles 7 770
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270

 

Partners