![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > Telephone technology
This brief surveys existing techniques to address the problem of long delays and high power consumption for web browsing on smartphones, which can be due to the local computational limitation at the smartphone (e.g., running java scripts or flash objects) level. To address this issue, an architecture called Virtual-Machine based Proxy (VMP) is introduced, shifting the computing from smartphones to the VMP which may reside in the cloud. Mobile Web Browsing Using the Cloud illustrates the feasibility of deploying the proposed VMP system in 3G networks through a prototype using Xen virtual machines (in cloud) and Android Phones with ATT UMTS network. Techniques to address scalability issues, resource management techniques to optimize the performance of the VMs on the proxy side, compression techniques to further reduce the bandwidth consumption, and adaptation techniques to address poor network conditions on the smartphone are also included.
NFC is a world standard since 2004 which is now within every smartphone on the market. Such a standard enables us to do mobile transactions (mobile payment) in a secure way along with many other information- based tap n play operations. This book has a double role for computer scientists (from bachelor students in CS to IT professionals).
"The new era of powerful, mobile computing and sensing devices
having ever larger memories and personal databases brings to light
a number of difficult problems in software, interface design,
search, organization of information, and methods for inferring
context and for sharing personal content... The authors have done
an admirable job at describing the problems and opportunities and,
as such, this book should be on the shelves of researchers
struggling to make these mobile devices truly valuable to the ever
expanding number of their users." "Personal Content Experience" is a comprehensive introduction to mobile personal content. The book introduces and explores issues such as context capture, user interfaces for continuous mobile use, UI design for mobile media applications, metadata magic, virtual communities, and ontologies. User interactions and behavioural patterns with personal content are also covered, resulting in a 'GEMS' lifecycle model for analysing media devices, services, applications, and user interfaces. In addition, the book describes an extensible software architecture targeted at content management in mobile devices, pointing out the essential topics that will benefit anyone developing mobile content-intensive applications and services. "Personal Content Experience: " Establishes a foundation for analyzing applications, services and user interfaces targeted at personal content. Provides a strong industrial insight, combining hands-on examples, application concepts and software architecture descriptions with theoretical frameworks and models. Offers a multi-disciplinary approach, considering both userperspective and technology aspects. This book is a clear and practical guide to the field of personal content and will be invaluable to practitioners in mobile industry and digital content management, media-intensive application developers, content creators and distributors, academic researchers, and lecturers in computer science and multimedia.
Design and development of a cost-effective mobile broadband wireless access network is a key challenge for many mobile network operators. Overdimensioning or underdimensioning of the access network results in additional costs and a reduction of the customer satisfaction, respectively. Thushara Weerawardane introduces new transport technologies and features for High Speed Packet Access (HSPA) and Long-Term Evolution (LTE) networks. He proposes novel adaptive flow control and enhanced congestion control algorithms and develops corresponding analytical models. These models are based on Markov chains and can be performed for faster analysis evaluation compared to long lasting detailed simulations. Both simulation and analytical models provide optimum network performance and reliable guaranteed quality of standard for the end users during congestion in the transport network. Further, the author investigates and analyzes the LTE transport network performance by introducing novel traffic differentiation models and buffer management techniques during intra-LTE handovers.
The iPhone represents an important moment in both the short history of mobile media and the long history of cultural technologies. Like the Walkman of the 1980s, it marks a juncture in which notions about identity, individualism, lifestyle and sociality require rearticulation. this book explores not only the iPhone's particular characteristics, uses and "affects," but also how the "iPhone moment" functions as a barometer for broader patterns of change. In the iPhone moment, this study considers the convergent trajectories in the evolution of digital and mobile culture, and their implications for future scholarship. Through the lens of the iPhone-as a symbol, culture and a set of material practices around contemporary convergent mobile media-the essays collected here explore the most productive theoretical and methodological approaches for grasping media practice, consumer culture and networked communication in the twenty-first century.
Mobile phones are no longer what they used to be. Not only can users connect to the Internet anywhere and anytime, they can also use their devices to map their precise geographic coordinates and access location-specific information like restaurant reviews, historical information, and locations of other people nearby. The proliferation of location-aware mobile technologies calls for a new understanding of how we define public spaces, how we deal with locational privacy, and how networks of power are developed today. In Mobile Interfaces in Public Spaces, Adriana de Souza E. Silva and Jordan Frith examine these social and spatial changes by framing the development of location-aware technology within the context of other mobile and portable technologies such as the book, the Walkman, the iPod, and the mobile phone. These technologies work as interfaces to public spaces that is, as symbolic systems that not only filter information but also reshape communication relationships and the environment in which social interaction takes place. Yet rather than detaching people from their surroundings, the authors suggest that location-aware technologies may ultimately strengthen our connections to locations.
This international, interdisciplinary collection explores a range of possible theoretical and empirical approaches to cultural technologies and mobile communication by treating the iPhone as a case study. As the mobile phone graduates into a fully web-capable and multi-media device, the contributors to this volume critically examine the nature and implications of this shift, considering the iPhone as a significant moment in media history. With the emergence of networked, convergent mobile media devices like the iPhone, new media and communication practices are emerging. Increasingly, the mobile phone is becoming a platform for gaming, online social networking and emergent lifestyle applications. The iPhone is symbolic of this phenomenon, but it also has its own distinctive features (in terms of branding and use), and so provides media and communication theorists with a unique opportunity to explore these practices. Indeed, the iPhone--as part of broader shifts toward ubiquitous, convergent mobile devices and "smartphones"--can be usefully deployed as a case study enabling new insights into mobile media culture.
The iPhone is the hottest gadget of our generation, and much of its success has been fueled by the App Store, Apple's online marketplace for iPhone applications. Over 1 billion apps have been downloaded in the 9 months the App Store has been open, ranging from the simplest games to the most complex business apps. Everyone has an idea for the next best-selling iPhone apppresumably that's why you're reading this now. And with the release of the iPad, this demand will just continue to grow. So how do you build an application for the iPhone and iPad? Don't you need to spend years learning complicated programming languages? What about Objective-C, Cocoa Touch, and the software development kit (SDK)? The answer is that you don't need to know any of those things. Anybody can start building simple applications for the iPhone and iPad, and this book will show you how. This book takes you to getting your first applications up and running using plain English and practical examples. It cuts through the fog of jargon and misinformation that surrounds iPhone and iPad application development, and gives you simple, step-by-step instructions to get you started.Teaches iPhone and iPad application development in language anyone can understand Provides simple, step-by-step examples that make learning easy Offers videos that enable you to follow along with the authorit's like your own private classroom What you'll learn Get both yourself and your computer set up for iPhone and iPad application development. Start by making small changes to existing applications to build your knowledge and experience before creating your own applications. Follow steps in plain English to build simple apps and get them working immediately. Style your application so that it looks good and users can easily navigate through it. Make use of the iPhone's touch screen and accelerometer. Use shortcuts and cheat sheets to create apps the easy way. Who this book is for If you have a great idea for an iPhone or iPad app, but have never programmed before, then this book is for you. You don't need to have any previous computer programming skills--as long as you have a desire to learn, and you know which end of the mouse is which, you'll be fine. Table of Contents Before We Get Started Blast-Off What's Next? An Introduction to the Code Buttons & Labels with Multiple Graphics Switch View with Multiple Graphics Dragging, Rotating, and Scaling Table Views, Navigation, and Arrays MapKit
The upcoming 5G specifications from 3GPP, to be available in 2018, will include LTE-Advanced Pro as well as a new 5G radio-access technology. This practical and very successful book, written by engineers working closely with 3GPP, gives insight into the newest technologies and standards adopted by 3GPP, with detailed explanations of the specific solutions chosen and their implementation in LTE, LTE-Advanced, and LTE-Advanced Pro, as well as providing a detailed description of the path to 5G and the associated underlying technologies. This edition has been thoroughly revised and updated to reflect the large extensions to LTE as introduced in 3GPP Releases 12 and 13 and the role of LTE in the upcoming 5G era. New to this edition includes updated content on: 4G and 5G Radio Access Spectrum for 4G and 5G Machine-Type Communication Device-to-Device Communication License-assisted Access Full-dimension MIMO Small-cell enhancements, eIMTA, FDD+TDD aggregation, dual connectivity Requirements on and general structure of 5G wireless access, addressing the existing and new usage scenarios for 5G Technical solutions for the new 5G radio-access technology The authors of this book all work at Ericsson Research and have been deeply involved in 3G and 4G development and standardization. They are leading experts in the field and are today actively contributing to the standardization of 4G and 5G within 3GPP.
The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that
On March 7, 1876, the U.S. Patent Office issued to a young inventor named Alexander Graham Bell what is arguably the most valuable patent ever: entitled "improvements in telegraphy," in truth it secured for Bell the basic principles involved in a telephone. On the same day that Bell filed his patent application, a caveat (a preliminary patent document) was filed by Elisha Gray. This coincidence sparked the first of many debates over whether Bell was the true inventor of the telephone. In the early 1860s Johann Phillipp Reis developed a version of the instrument, but his claims against Bell were hampered by the bungling of his lawyers in demonstrating his instrument in court. This work is a first look at the many men who developed the telephone and an examination of their claims against Bell's patent. A lay description of the phone is also provided, as well as a history of the development of the telephone system.
Globalization of Mobile and Wireless Communications is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and performed research work of leading experts in the field. Topics of discussion are related but not limited to spectrum-efficient radio interface technologies, enabling technologies for reconfigurability, wireless sensor networks, cognitive networks, coherent wireless transmission, algorithmic design, middleware for novel services and applications. The material has been edited to provide a vision for the future of mobile and wireless, towards a dynamic communication system that breaks down the barriers between communications means; and evolves and integrates business models and culture to match the technological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined.
We think we know everything about our smartphones. We use them
constantly. We depend on them for every conceivable purpose. We are
familiar with every inch of their compact frames. But there is more
to the smartphone than meets the eye.
The iPhone 11, 11 Pro, 11R, and 11Max are faster than ever and have more powerful cameras. With the latest edition of this bestselling guide, you get a funny, gorgeously illustrated guide to the tips, shortcuts, and workarounds that will turn you into an iPhone master. Written by David Pogue-Missing Manual series creator, New York Times columnist, and Emmy-winning tech correspondent for CNBC, CBS, and NPR-this update shows you everything you need to know about new iPhone features and the iOS 13 user interface. Pick up this beautiful full-color book and learn how to get the most out of your iPhone.
Mobile computing technology has come a long way in recent years-providing anytime, anywhere communication and access to information. Bringing students up to date on important technological and industry developments, Principles of Mobile Computing and Communications examines mobile networks and relevant standards, highlighting issues unique to the mobile computing environment and exploring the differences between conventional and mobile applications. Going beyond discussions on wireless network infrastructure and how to develop enterprise mobile applications, this textbook considers pervasive computing and smart environments, the complexity of designing and developing such applications, and how issues are dependent on the context of the applications. Following an overview of what mobile computing has to offer and how its applications affect both our professional and personal lives, it focuses on the technologies and the infrastructure of all mobile and wireless networks, cellular networks, WLANs, WPANs, and sensor and mobile ad hoc networks. The textbook then discusses the Mobile IP, adaptive behavior, power management, resource constraints, interface design, seamless mobility support, and locating sensing techniques and systems. It also discusses important security issues that concern all users regardless of applications employed.
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies. VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for: * gauging VoIP readiness on an enterprise network * using SIP, H.3 23, and other signaling specifications * providing low-layer security in a VoIP environment * employing IP hardphones, analog telephone adapters, and softPBX servers * dealing with and avoiding the most common VoIP deployment mistakes In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.
It wasn't long ago that owning a cell phone put you on the cusp of modern technology. Now, just a few short years later, "smartphones" have taken over, profoundly changing the way we socially interact. Not surprisingly, they have become the most sought-after piece of technology on the market, with tens of millions currently in use. Defined as a mobile phone with computer functionality, these amazing little devices allow you to do everything from send email and take pictures to control other computers remotely. With all of these built-in capabilities, smartphones can be a challenge to master. And some of the smartest, most feature-rich smartphones are being manufactured by Nokia. With that in mind, "Nokia Smartphone Hacks" shows you how to squeeze everything you can out of these revolutionary computers. Covering a wide variety of topics, the book explains how to: tweak the smartphone's user interface; take screen shots; use the phone with other devices; access Internet content; use email and messaging; use the camera and multimedia; access databases and business applications; and write advanced hacks with Java and Symbian. "Nokia Smartphone Hacks" is written in O'Reilly's popular "Hacks" format, meaning it's full of quick and dirty solutions. Furthermore, each hack stands completely on its own, so you can browse and jump to different sections that interest you most. Whether you want to customize your smartphone, add on some extra features, or run some third-party software, "Nokia Smartphone Hacks" is there to guide the way. Nokia smartphones are capable of doing many clever things, but sharing its shortcuts isn't one of them. This is the only guide that lets you unlock all of its time-saving secrets.
More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's "Switching to VoIP" provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed andprojects presented: building a softPBX configuring IP phones ensuring quality of service scalability standards-compliance topological considerations coordinating a complete system ?switchover? migrating applications like voicemail and directory services retro-interfacing to traditional telephony supporting mobile users security and survivability dealing with the challenges of NAT To help you grasp the core principles at work, "Switching to VoIP" uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. "Switching to VoIP" remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: SIP H.323, SCCP, and IAX Voice codecs 802.3af Type of Service, IP precedence, DiffServ, and RSVP 802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.
Your company can save tons of money by taking advantage of Asterisk, an open-source PBX that allows you to bridge data and voice communications. Asterisk for Dummies saves you all the worries and confusion with its easy-to-use, step-by-step walkthrough of the entire program that will have you set up in no time! Asterisk takes the data side of telecom and applies it to the handling and processing of voice calls. This book will show you everything you need to know to install, program, and grow with Asterisk. The invaluable information covered in this guide shows you how to: * Utilize dialplan, add features, and build infrastructure * Maintain your telecom service * Address call-quality concerns and completion issues * Provide long-term health for your Asterisk switch * Operate the AsteriskNOW GUI * Utilize VoIP codecs * Troubleshoot VoIP calls with packet captures * Avoid the things you should never do with Asterisk In addition to these essential tools, this trusty guide shows you how to manipulate your Asterisk and make it even more useful, such as fending off telemarketers, creating a voice mailbox that e-mails everyone, and transmitting your voice through your stereo. It also has quick references that no Asterisk operator should be without, like dialplan functions, VoIP basics, and a concise guide to Linux. With Asterisk for Dummies, you'll have the power to handle all the necessary programming to set up the system and keep it running smoothly.
Put your phone system on your computer network and see the savings. See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. Using this work: discover how to Use VoIP for your business or home phone service, choose the best network type, set up VoIP on a wireless network, understand transports and services, and demonstrate VoIP's advantages to management.
The Live-Streaming Handbook will teach you how to present live-video shows from your phone and stream them straight to Facebook and Twitter. With this book and your favourite social media apps, you will be able to run your own TV station for your home or work. Peter Stewart, an experienced TV and radio presenter, producer and author, now shares the training he's given to professional broadcasters with you! From structuring and developing a show, to establishing an effective online persona and getting more people to watch you. The book includes dozens of tried and tested formats for your live-video show, alongside case studies highlighting how businesses and professionals are using live-streaming in their brand and marketing strategies. Also included are: a foreword by Al Roker (NBC's The Today Show); practical steps for using popular live-streaming apps, such as Facebook Live and Twitter; nearly 80 colour images of live-streaming events, screenshots and gadgets; a detailed walk-through of how to successfully present and produce your live-streaming show; advice on analysing and exploiting viewer metrics to increase followers; more than 130 quotes of real-world advice from expert producers of online media content; over 700 links to online case studies, articles, research and background reading. With this extensive manual you will gain a competitive edge in the world of online live-streaming. This book is invaluable to entrepreneurs, professionals and students working in journalism, public relations, marketing and digital media, as well as general readers interested in live-streaming at home.
Windows Phone 7.5 (code-named Mango) marks a significant upgrade to Microsoft's smartphone products. Packed with sophisticated new features and functionality, the device is a .NET developer's dream, easily programmable using Silverlight, XNA and C#. Windows Phone Recipes utilizes a proven problem-solution approach, providing a concise guide to all the phone's features in recipe book format. First, the problem you're facing is identified. Then, a clear explanation of the solution is given, supported by a fully-worked code sample that demonstrates the feature in action. All aspects of development, configuration, testing, and distribution are covered. You'll find recipes that unlock advanced user interface features, deal with data storage, integrate with cloud services, add media and location services, and much more. It's everything you'll need to put a professional polish on your Windows Phone 7.5 applications What you'll learn * Understand how to design, develop, test and distribute your Windows Phone 7.5 applications * Create compelling user interfaces using all the phone's features, including the camera, GPS and accelerometer * Learn how to debug your applications and package them for distribution and sale though the Windows Phone Marketplace and beyond * Extend your application into the cloud using push notifications and web-based services to take advantage of off-device processing and storage Who this book is for This book is for existing .NET and Windows Mobile developers. Its concise recipe format will also appeal to new Windows Phone developers and those looking for an insightful reference to support their day-to-day coding efforts. Table of Contents * Introduction to Developing Windows Phone Applications * Windows Phone Must Knows * Windows Phone Execution Model * The User Interface * The User Interface With Expression Blend * Gestures * Sensors * Media Management * Isolated Storage * In the Cloud * Testing Windows Phone Applications * Deploying your Application
Just as consumer demands for mobile devices have risen rapidly, the use of cell phones by prison inmates has grown as the U.S. prison population continues to expand. This use is considered contraband by prison officials. The number of cell phones confiscated by prison officials has dramatically increased in only a few years. This increase in unauthorised cell phone use by inmates is a mounting concern among correctional administrators across the country. This book investigates and examines wireless technology solutions to prevent contraband cell phone use in prisons, such as jamming, managed access, and detection.
Near field communication (NFC) can appear to be a simple intuitive technology for exchanging data between close devices. In reality, these contactless structures that combine components and antennas must respect important and specific working constraints. Illustrated by a number of detailed technological examples, this book discusses the multiple normative (ISO, CEN, NFC Forum, EMVCo, etc.) and regulatory (ERC, FCC, ETSI, radiofrequency, private and ecological pollution, etc.) constraints, as well as the applied, typological, functional, structural, environmental or interoperability constraints that a NFC device might face. Design Constraints for NFC Devices also presents techniques that enable us to free ourselves from the technological constraints of current NFC operations encountered in banking, public transport, administration, automotive, industrial, communicating object and Internet of Things applications.
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity " -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you: Determine what type of data is stored on the device Break v1.x and v2.x passcode-protected iPhones to gain access to the device Build a custom recovery toolkit for the iPhone Interrupt iPhone 3G's "secure wipe" process Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition Recover deleted voicemail, images, email, and other personal data, using data carving techniques Recover geotagged metadata from camera photos Discover Google map lookups, typing cache, and other data stored on the live file system Extract contact information from the iPhone's database Use different recovery strategies based on case needs And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan. |
You may like...
Android Boot Camp for Developers Using…
Corinne Hoisington
Paperback
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Fundamental and Supportive Technologies…
Sherine Mohamed Abd El-Kader, Hanan Hussein
Hardcover
R6,218
Discovery Miles 62 180
Digital Transformation and Its Role in…
Sam B Edwards III, Diogo Santos
Hardcover
R5,094
Discovery Miles 50 940
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues
Paperback
R4,669
Discovery Miles 46 690
|