0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (868)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

OpenVMS Performance Management (Paperback): Joginder Sethi OpenVMS Performance Management (Paperback)
Joginder Sethi
R2,201 Discovery Miles 22 010 Ships in 10 - 15 working days

This text is intended as a guide to OpenVMS performance management and application design. It features a variety of performance-related topics, and guidelines are given, with examples on how to relieve specific problems It features tuning tips on RDBMs (Oracle, Ingres, and Rdb) and making changes to Sysgen parameters, and specific application tuning (All-in-1, Pathworks, X-Windows and TCP/IP). It covers tuning methodologies, contains information on a range of performance-related topics, and provides information on "rules of thumb" on CPU, memory and disk I/O management. It also covers versions 5.0 and 6.0 of VMS.

The Lean IT Field Guide - A Roadmap for Your Transformation (Paperback): Michael A Orzen, Thomas A. Paider The Lean IT Field Guide - A Roadmap for Your Transformation (Paperback)
Michael A Orzen, Thomas A. Paider
R1,493 Discovery Miles 14 930 Ships in 12 - 17 working days

How many IT books have you read that are long on theory and short on practical application? They are interesting, but not very impactful. They provide a framework from which to think and understand, but lack a process from which to act. Addressing this urgent need for the IT community, The Lean IT Field Guide explains how to initiate, execute, and sustain a lean IT transformation. Illuminating a clear path to lean IT, the authors integrate more than two decades of combined experience to provide you with a proven method for creating and sustaining a true lean IT workplace. This field guide not only highlights the organizational techniques of more agile and lean processes, but also the leadership work required to help management adopt these new approaches. Based on proven methods from different industries, including banking, manufacturing, insurance, food and beverage, and logistics, the book details a clear model that covers all the components you need to achieve and sustain a favorable work environment and culture in support of lean IT. Filled with anecdotes and case studies from actual businesses, the book includes pictures, templates, and examples that illustrate the application of the lean methods discussed.

The Stakeholder Perspective - Relationship Management to Increase Value and Success Rates of Projects (Hardcover): Massimo... The Stakeholder Perspective - Relationship Management to Increase Value and Success Rates of Projects (Hardcover)
Massimo Pirozzi
R1,900 Discovery Miles 19 000 Ships in 12 - 17 working days

The Stakeholder Perspective places people at the center of both projects and project management. It gives to the project management community a helpful, innovative, stakeholder-centered approach to increase projects' delivered value and success rate. It presents a logical model also called the "Stakeholder Perspective," which acts as the reference point in a structured path to effectiveness. Starting from the analysis of a project's stakeholders, the model integrates both rational and relational innovative approaches. Its continuous focus on stakeholder requirements and expectations helps to set a proper path, and to maintain it, in order to target success and to achieve goals in a variety of projects with different size and complexity. The book presents a set of innovative and immediately applicable techniques for effective stakeholder identification and classification, as well as analysis of stakeholder requirements and expectations, key stakeholders management, stakeholder network management, and, more generally, stakeholder relationship management. The proposed stakeholder classification model consists of just four communities, each one based on the commonality of main interests and behavior. This model features an accurate and stable identification process to increase effective communication and drastic reduce relationship complexity. A systemic approach is proposed to analyze both stakeholder requirements and expectations. The approach aids in detecting otherwise unclear stakeholder requirements and/or hidden stakeholder expectations. An interactive communication model is presented along with its individual and organizational frames of reference. Also presented are relevant cues to maximize effective and purposeful communication with key stakeholders as well as with the stakeholder network. The importance of satisfying not only the project requirements but also the stakeholder expectations is demonstrated to be the critical success factor in all projects. An innovative approach based on the perceived value and key performance indicators shows how to manage different levels of project complexity. The book also defines a complete structured path to relationship effectiveness called "Relationship Management Project," which can be tailored to enhance stakeholder and communication management processes in each one of the project management process groups (i.e. initiating, planning, executing, monitoring and controlling, and closing). The book concludes with a look ahead at Project Management X.0 and the stakeholder-centered evolution of both project and portfolio management.

Business Intelligence for Small and Medium-Sized Enterprises - An Agile Roadmap toward Business Sustainability (Hardcover):... Business Intelligence for Small and Medium-Sized Enterprises - An Agile Roadmap toward Business Sustainability (Hardcover)
Lila Rao-Graham, Maurice L. McNaughton, Gunjan Mansingh
R2,212 Discovery Miles 22 120 Ships in 12 - 17 working days

Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations. With online analytical processing (OLAP), organizations have also established the capability to extract internal and external data from a variety of sources to specifically obtain intelligence about non-routine and often less-structured arrangements. BI therefore refers to applications and technologies that are used to gather, provide access to, and analyze data and information about the operations of an organization. It has the capability of providing comprehensive insight into the more volatile factors affecting the business and its operations, thereby facilitating enhanced decision-making quality and contributing to the creation of business value. Larger and more sophisticated organizations have long been exploiting these capabilities. Business Intelligence for Small and Medium-Sized Enterprises (SMEs) guides SMEs in replicating this experience to provide an agile roadmap toward business sustainability. The book points out that successful BI implementations have generated significant increases in revenue and cost savings, however, the failure rates are also very high. More importantly, it emphasizes that a full range of BI capabilities is not the exclusive purview of large organizations. It shows how SMEs make extensive use of BI techniques to develop the kind of agility endowing them with the organizational capability to sense and respond to opportunities and threats in an increasingly dynamic business environment. It points to the way to a market environment in which smaller organizations could have a larger role. In particular, the book explains that by establishing the agility to leverage internal and external data and information assets, SMEs can enhance their competitiveness by having a comprehensive understanding of the key to an agile roadmap for business sustainability.

Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover)
Cyrus F Nourani
R2,753 Discovery Miles 27 530 Ships in 12 - 17 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,548 Discovery Miles 25 480 Ships in 12 - 17 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Hardcover)
Heru Susanto, Mohammad Nabil Almunawar
R2,866 Discovery Miles 28 660 Ships in 12 - 17 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Effective Coding with VHDL - Principles and Best Practice (Hardcover): Ricardo Jasinski Effective Coding with VHDL - Principles and Best Practice (Hardcover)
Ricardo Jasinski
R1,521 R1,414 Discovery Miles 14 140 Save R107 (7%) Ships in 9 - 15 working days

A guide to applying software design principles and coding practices to VHDL to improve the readability, maintainability, and quality of VHDL code. This book addresses an often-neglected aspect of the creation of VHDL designs. A VHDL description is also source code, and VHDL designers can use the best practices of software development to write high-quality code and to organize it in a design. This book presents this unique set of skills, teaching VHDL designers of all experience levels how to apply the best design principles and coding practices from the software world to the world of hardware. The concepts introduced here will help readers write code that is easier to understand and more likely to be correct, with improved readability, maintainability, and overall quality. After a brief review of VHDL, the book presents fundamental design principles for writing code, discussing such topics as design, quality, architecture, modularity, abstraction, and hierarchy. Building on these concepts, the book then introduces and provides recommendations for each basic element of VHDL code, including statements, design units, types, data objects, and subprograms. The book covers naming data objects and functions, commenting the source code, and visually presenting the code on the screen. All recommendations are supported by detailed rationales. Finally, the book explores two uses of VHDL: synthesis and testbenches. It examines the key characteristics of code intended for synthesis (distinguishing it from code meant for simulation) and then demonstrates the design and implementation of testbenches with a series of examples that verify different kinds of models, including combinational, sequential, and FSM code. Examples from the book are also available on a companion website, enabling the reader to experiment with the complete source code.

Reliable Distributed Computing with the Isis Toolkit (Hardcover): K.P. Birman Reliable Distributed Computing with the Isis Toolkit (Hardcover)
K.P. Birman
R3,267 Discovery Miles 32 670 Ships in 12 - 17 working days

In distributed computing systems--the software for networks--a system may have a huge number of components resulting in a high level of complexity. That and issues such as fault-tolerance, security, system management, and exploitation of concurrency make the development of complex distributed systems a challenge.

The Isis Toolkit has become one of the most successful approaches for building reliable distributed software since its release in 1987. Commercially available since 1990, Isis is used in hundreds of settings, including the New York Stock Exchange, the Electronic Stock Exchange of Switzerland, the data acquisition system of the CERN high-energy physics particle accelerator, VLSI fabrication control systems, the Iridium telecommunication system, database applications at the World Bank, and an Arctic weather environment monitoring system. Isis is also widely used for instructional purposes.

This book comprises papers that document Isis and describe its important applications. Many of these are previously unpublished papers that give a broad overview of Isis, provide details of the underlying protocols and theory, and discuss the best ways to exploit Isis features in real applications. This volume will be of use to practitioners developing Isis-based applications, to instructors using Isis in classroom settings, and to researchers who want a single reference source for this important approach to distributed computing.

Introduction to Healthcare Information - Enabling Technologies (Paperback): Raymond Gensinger Introduction to Healthcare Information - Enabling Technologies (Paperback)
Raymond Gensinger
R1,952 Discovery Miles 19 520 Ships in 12 - 17 working days

Based on HIMSS' highly successful Annual Conference workshop, "Introduction to Healthcare and IT Enabling Technologies: All You Wanted to Know and Were Afraid to Ask," this book is a valuable resource for individuals new to healthcare, healthcare professionals transitioning into the field of information technology, students or anyone wanting a better understanding of the role IT plays within today's healthcare system. The book introduces many enabling technologies currently used within healthcare, including electronic health records, personal health records, medication dispensing devices, bioelectronic equipment and patient identification technologies. In addition, the books contributors--nationally recognized leaders of their organizations' successful IT implementations--explore how external influences, such as the evolving legislative activities in Washington DC, are responsible for the rapid changes facing health IT today. With chapters focused on IT use from bedside to board room, Introduction to Healthcare Information Enabling Technologies examines today's health IT environment from various stakeholder perspectives, including nurses, physicians and the C-Suite--CEO, CFO and CIO. (2010.)

The Moderator's Survival Guide - Handling Common, Tricky, and Sticky Situations in User Research (Paperback): Donna... The Moderator's Survival Guide - Handling Common, Tricky, and Sticky Situations in User Research (Paperback)
Donna Tedesco, Fiona Tranquada
R1,131 Discovery Miles 11 310 Ships in 9 - 15 working days

"The Moderator's Survival Guide" is your indispensable resource for navigating the rocky shoals of your one-on-one user research sessions. Inside, you ll find guidance for nearly 100 diverse situations (ranging from business-as-usual to tricky and sticky) that might occur during usability studies, contextual inquiries, or user interviews.

As a moderator, you are responsible for the well-being of the participant, your study, and your organization. You must be prepared for anything that may happen, from your technology failing to the participant quailing. Use this guide to identify your best next steps, react appropriately, and survive any challenges that comes your way.
Practical, field-tested, and actionable tips for what to do and say-and what NOT to do or say-in each situation.Key patterns and extensive examples to sharpen your approach to the commonplace and prepare you for the unlikely.Illustrative "survival stories" contributed by numerous professionals on the front lines of user research."

Network Programmability and Automation Fundamentals (Paperback): Khaled Abuelenain, Anton Karneliuk, Vinit Jain, Jeff Doyle Network Programmability and Automation Fundamentals (Paperback)
Khaled Abuelenain, Anton Karneliuk, Vinit Jain, Jeff Doyle
R2,058 R1,627 Discovery Miles 16 270 Save R431 (21%) Ships in 12 - 17 working days

Modernize and optimize network management with APIs and automation Legacy network management approaches don't scale adequately and can't be automated well. This guide will help meet tomorrow's challenges by adopting network programmability based on Application Programming Interfaces (APIs). Using these techniques, you can improve efficiency, reliability, and flexibility; simplify implementation of high-value technologies; automate routine administrative and security tasks; and deploy services far more rapidly. Four expert authors help you transition from a legacy mindset to one based on solving problems with software. They explore today's emerging network programmability and automation ecosystem; introduce each leading programmable interface; and review the protocols, tools, techniques, and technologies that underlie network programmability. You'll master key concepts through hands-on examples you can run using Linux, Python, Cisco DevNet sandboxes, and other easily accessible tools. This guide is for all network architects, engineers, operations, and software professionals who want to integrate programmability into their networks. It offers valuable background for Cisco DevNet certification-and skills you can use with any platform, whether you have software development experience or not. Master core concepts and explore the network programmability stack Manage network software and run automation scripts in Linux environments Solve real problems with Python and its Napalm and Nornir automation frameworks Make the most of the HTTP protocol, REST architectural framework, and SSH Encode your data with XML, JSON, or YAML Understand and build data models using YANG that offer a foundation for model-based network programming Leverage modern network management protocols, from gRPC and gNMI to NETCONF and RESTCONF Meet stringent service provider KPIs in large-scale, fast-changing networks Program Cisco devices running IOS XE, IOS XR, and NX-OS as well as Meraki, DNA Center, and Webex platforms Program non-Cisco platforms such as Cumulus Linux and Arista EOS Go from "zero to hero" with Ansible network automation Plan your next steps with more advanced tools and technologies

Software Engineering Approaches for Offshore and Outsourced Development - 4th International Conference, SEAFOOD 2010, St.... Software Engineering Approaches for Offshore and Outsourced Development - 4th International Conference, SEAFOOD 2010, St. Petersburg, Russia, June 17-18, 2010, Proceedings (Paperback, 2010 ed.)
Martin Nordio, Mathai Joseph, Bertrand Meyer, Andrey Terekhov
R1,946 R1,610 Discovery Miles 16 100 Save R336 (17%) Out of stock

Today's software production is increasingly distributed. Gone are the days of one-company,one-siteprojects;mostindustrialdevelopmentsinvolveteamssplit over locations, countries, and cultures. This distribution poses new challenges, for example, how to develop the software requirements speci?cation, and how to manage the project. These challenges are formidable; many failures have been reportedinoutsourcedanddistributedprojects,oftenduenottolackoftechnical expertise, but to di?culties in management and communication. SEAFOOD 2010, the fourth international conference on Software Engine- ing Advances For Outsourced and O?shore Development, was held in Peterhof (SaintPetersburg),Russia,on17-18June2010.SEAFOOD2010providedan- portunity for participants from academia and industry to confront experiences, ideas and proposals. The submissions received covered a wide range of topics, from country-wide reports from Russia and Argentina to global projectmana- ment. This volume includes 8 papers (4 full papers and 4 short papers) from the conference, selected after review by the Program Committee. The program also included two keynote presentations and the extended abstracts are included in this volume: "A Smarter Way: The Software Engineering Method and Theory Initiative (Semat)", by Ivar Jacobson, and "The Consortium for IT Software Quality", by Richard Mark Soley and Bill Curtis. Many people contributed to SEAFOOD 2010. We thank the Program C- mittee and the external reviewers for their excellent work in reviewing and - lecting the papers. The role of Andrei Voronkov's EasyChair conference system is gratefully acknowledged.

Mobile Networks and Management - First International Conference, MONAMI 2009, Athens, Greece, October 13-14, 2009. Revised... Mobile Networks and Management - First International Conference, MONAMI 2009, Athens, Greece, October 13-14, 2009. Revised Selected Papers (Paperback, Edition.)
Kostas Pentikousis, Oliver Blume, Ramon Aguero, Symeon Papavassiliou
R1,952 R1,650 Discovery Miles 16 500 Save R302 (15%) Out of stock

The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13-14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top - searchers, academics, and practitioners specializing in the area of mobile network management. Multiaccess and resource management, mobility management, and n- work management have emerged as core topics in the design, deployment, and ope- tion of current and future networks. Yet, they are treated as separate, isolated domains with very little interaction between the experts in these fields and lack cro- pollination. MONAMI 2009 offered the opportunity to leading researchers, industry professionals, and academics to meet and discuss the latest advances in these areas and present results related to technologies for true plug-and-play networking, efficient use of all infrastructure investments, and access competition. MONAMI 2009 featured eight full papers and five short papers, which were - lected after a thorough peer-review process based on their relevance to the scope of the conference and their technical merit. The overall acceptance rate was 50%. The contributing authors covered a range of topics in mobile networks and their mana- ment that are currently of high interest in the wireless research area.

Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover):... Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover)
Benoit Claise, Joe Clarke, Jan Lindblad
R1,512 R1,184 Discovery Miles 11 840 Save R328 (22%) Ships in 12 - 17 working days

Today, networks must evolve and scale faster than ever. You can't manage everything by hand anymore: You need to automate relentlessly. YANG, along with the NETCONF, RESTCONF, or gRPC/gNMI protocols, is the most practical solution, but most implementers have had to learn by trial and error. Now, Network Programmability with YANG gives you complete and reliable guidance for unlocking the full power of network automation using model-driven APIs and protocols. Authored by three YANG pioneers, this plain-spoken book guides you through successfully applying software practices based on YANG data models. The authors focus on the network operations layer, emphasizing model-driven APIs, and underlying transports. Whether you're a network operator, DevOps engineer, software developer, orchestration engineer, NMS/OSS architect, service engineer, or manager, this guide can help you dramatically improve value, agility, and manageability throughout your network. Discover the value of implementing YANG and Data Model-Driven Management in your network Explore the layers and components of a complete working solution Build a business case where value increases as your solution grows Drill down into transport protocols: NETCONF, RESTCONF, and gNMI/gRPC See how telemetry can establish a valuable automated feedback loop Find data models you can build on, and evaluate models with similar functionality Understand models, metadata, and tools from several viewpoints: architect, operator, module author, and application developer Walk through a complete automation journey: business case, service model, service implementation, device integration, and operation Leverage the authors' experience to design successful YANG models and avoid pitfalls

UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback): P Roques UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback)
P Roques
R1,380 R1,143 Discovery Miles 11 430 Save R237 (17%) Ships in 10 - 15 working days

* Offers comprehensive coverage of all major modeling viewpoints
* Provides details of collaboration and class diagrams for filling in the design-level models

Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots (Paperback): Hailong Huang, Andrey V.... Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots (Paperback)
Hailong Huang, Andrey V. Savkin, Chao Huang
R3,975 Discovery Miles 39 750 Ships in 10 - 15 working days

Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wireless sensor networks and cellular networks. For wireless sensor networks, the book presents approaches using mobile robots or UAVs to collect sensory data from sensor nodes. For cellular networks, it discusses the approaches to using UAVs to work as aerial base stations to serve cellular users. In addition, the book covers the challenges involved in these two networks, existing approaches (e.g., how to use the public transportation vehicles to play the role of mobile sinks to collect sensory data from sensor nodes), and potential methods to address open questions.

Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition): David R. Bull, Fan Zhang Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition)
David R. Bull, Fan Zhang
R3,851 Discovery Miles 38 510 Ships in 10 - 15 working days

Intelligent Image and Video Compression: Communicating Pictures, Second Edition explains the requirements, analysis, design and application of a modern video coding system. It draws on the authors' extensive academic and professional experience in this field to deliver a text that is algorithmically rigorous yet accessible, relevant to modern standards and practical. It builds on a thorough grounding in mathematical foundations and visual perception to demonstrate how modern image and video compression methods can be designed to meet the rate-quality performance levels demanded by today's applications and users, in the context of prevailing network constraints. "David Bull and Fan Zhang have written a timely and accessible book on the topic of image and video compression. Compression of visual signals is one of the great technological achievements of modern times, and has made possible the great successes of streaming and social media and digital cinema. Their book, Intelligent Image and Video Compression covers all the salient topics ranging over visual perception, information theory, bandpass transform theory, motion estimation and prediction, lossy and lossless compression, and of course the compression standards from MPEG (ranging from H.261 through the most modern H.266, or VVC) and the open standards VP9 and AV-1. The book is replete with clear explanations and figures, including color where appropriate, making it quite accessible and valuable to the advanced student as well as the expert practitioner. The book offers an excellent glossary and as a bonus, a set of tutorial problems. Highly recommended!" --Al Bovik

Tactile Internet - with Human-in-the-Loop (Paperback): Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe,... Tactile Internet - with Human-in-the-Loop (Paperback)
Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe, Meryem Simsek, …
R3,826 Discovery Miles 38 260 Ships in 10 - 15 working days

Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations. The book promotes the concept of the Tactile Internet for remote closed-loop human-machine interaction and describes the main challenges and key technologies. Current standardization activities in the field for IEEE and IETF are also described, making this book an ideal resource for researchers, graduate students, and industry R&D engineers in communications engineering, electronic engineering, and computer engineering.

Randomly Deployed Wireless Sensor Networks (Paperback): XI Chen Randomly Deployed Wireless Sensor Networks (Paperback)
XI Chen
R4,234 Discovery Miles 42 340 Ships in 10 - 15 working days

Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.

Kya Hai Network Marketing Jaaniyen (Hindi, Paperback): Surya Sinha Kya Hai Network Marketing Jaaniyen (Hindi, Paperback)
Surya Sinha
R553 Discovery Miles 5 530 Ships in 10 - 15 working days
Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback): Surya Sinha Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback)
Surya Sinha
R478 Discovery Miles 4 780 Ships in 10 - 15 working days
Turf - A Social and Economic History of Horse Racing (Hardcover, 2nd Edition): Wary Vamplew Turf - A Social and Economic History of Horse Racing (Hardcover, 2nd Edition)
Wary Vamplew
R2,651 Discovery Miles 26 510 Ships in 10 - 15 working days

This is the second edition of the classic on the history of British horse racing. It provides a detailed and far-ranging social and economic analysis of the major changes in British flat racing, in particular in the period between 1830 and 1939. Four major themes are explored. Firstly, the changing character and structure of the sport. Secondly, the morality of racing, which was a corrupt sport par excellence for much of the nineteenth century. Thirdly, on four categories of participants in racing jockeys, trainers, owners and breeders. Here, the author assesses whether or not these could make money out of racing. Fourthly, the book examines gambling and its important symbiotic relationship with racing. The televised, sponsored, carefully governed sport today is a vastly different affair from that of the 18th century. Then racing was a free, social event, the highlight of the entertainment calendar for the bulk of the local community. By the late 19th century most race meetings were highly commercial enterprises, requiring payment from all spectators, many of whom had travelled some distance to attend. The excitement and historical interest of these meetings is well captured here."

Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover): J. J. Stapleton Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover)
J. J. Stapleton
R3,093 Discovery Miles 30 930 Ships in 9 - 15 working days

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics. Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

PgMP Exam Challenge! (Paperback, New): J Leroy Ward Pmp Pgmp, Ginger Levin, PMP, PgMP PgMP Exam Challenge! (Paperback, New)
J Leroy Ward Pmp Pgmp, Ginger Levin, PMP, PgMP
R1,423 Discovery Miles 14 230 Ships in 12 - 17 working days

Up to date with the third edition of PMI's Program Management Standard, The PgMP (R) Exam Challenge! contains more than 300 practice questions to help readers hone their knowledge and test their skills. It covers all five of the program management domains: Strategic Program Management, Program Management Life Cycle, Benefits Management, Stakeholder Management, and Governance. It also examines all of the sub domains of the lifecycle domain. With an easy-to-use format, this is an ideal resource for those preparing to take the PgMP exam.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Sky Fox - For Children With Feelings…
Pia Jones Paperback R459 Discovery Miles 4 590
Carefully Everywhere Descending
Glenn Alan Cheney Hardcover R954 Discovery Miles 9 540
Invisible Personas
Joan Marie Kelly Hardcover R1,210 Discovery Miles 12 100
Laura Knight - A Celebration
Elizabeth. Knowles Paperback R496 Discovery Miles 4 960
Guiding Kids Through the Tough Moments…
Mark Le Messurier Paperback R763 Discovery Miles 7 630
Understanding Children's Worry…
Charlotte Wilson Hardcover R4,302 Discovery Miles 43 020
Emotional Intelligence 2.0 - Master Your…
Ferdinand Macy Hardcover R625 Discovery Miles 6 250
Conceptual PlayWorlds for Wellbeing - A…
Kelly-Ann Allen Paperback R676 Discovery Miles 6 760
Introducing Joseph Crawhall
Joanna Meacock Paperback R347 Discovery Miles 3 470
Volume 7
Friend of the Artist Hardcover R995 R856 Discovery Miles 8 560

 

Partners