Filter
(found 13022 products)
Book cover image
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This ...
Cyber Threat Intelligence
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.
https://magrudy-assets.storage.googleapis.com/9783319739502.jpg
114.450000 USD

Cyber Threat Intelligence

Hardback
Book cover image
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that ...
Transactions on Computational Collective Intelligence XXVIII
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-eight issue is a special issue with 11 selected papers from the International Conference on Agents and Artificial Intelligence, ICAART 2016 and 2017 editions.
https://magrudy-assets.storage.googleapis.com/9783319783000.jpg
102.900000 USD

Transactions on Computational Collective Intelligence XXVIII

Paperback
Book cover image
The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017. The 184 full papers presented were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections on: Best ...
Advances in Multimedia Information Processing - PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II
The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017. The 184 full papers presented were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections on: Best Paper Candidate; Video Coding; Image Super-resolution, Debluring, and Dehazing; Person Identity and Emotion; Tracking and Action Recognition; Detection and Classification; Multimedia Signal Reconstruction and Recovery; Text and Line Detection/Recognition; Social Media; 3D and Panoramic Vision; Deep Learning for Signal Processing and Understanding; Large-Scale Multimedia Affective Computing; Sensor-enhanced Multimedia Systems; Content Analysis; Coding, Compression, Transmission, and Processing.
https://magrudy-assets.storage.googleapis.com/9783319773827.jpg
187.950000 USD

Advances in Multimedia Information Processing - PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II

Paperback
Book cover image
This textbook provides engineering students with instruction on processing signals encountered in speech, music, and wireless communications using software or hardware by employing basic mathematical methods. The book starts with an overview of signal processing, introducing readers to the field. It goes on to give instruction in converting continuous time ...
Introduction to Digital Signal Processing Using MATLAB with Application to Digital Communications
This textbook provides engineering students with instruction on processing signals encountered in speech, music, and wireless communications using software or hardware by employing basic mathematical methods. The book starts with an overview of signal processing, introducing readers to the field. It goes on to give instruction in converting continuous time signals into digital signals and discusses various methods to process the digital signals, such as filtering. The author uses MATLAB throughout as a user-friendly software tool to perform various digital signal processing algorithms and to simulate real-time systems. Readers learn how to convert analog signals into digital signals; how to process these signals using software or hardware; and how to write algorithms to perform useful operations on the acquired signals such as filtering, detecting digitally modulated signals, correcting channel distortions, etc. Students are also shown how to convert MATLAB codes into firmware codes. Further, students will be able to apply the basic digital signal processing techniques in their workplace. The book is based on the author's popular online course at University of California, San Diego.
https://magrudy-assets.storage.googleapis.com/9783319760285.jpg
94.490000 USD

Introduction to Digital Signal Processing Using MATLAB with Application to Digital Communications

by K.S. Thyagarajan
Hardback
Book cover image
Become familiar with ICND1 (100-105) exam objectives, and learn how to get ready for the exam Key Features A step by step guide that will build you skills from basic concepts to completely understanding network communication Comprehensive coverage to help you implement the knowledge you've gained in real-world scenarios Take ...
CCENT/CCNA: ICND1 100-105 Certification Guide: Learn computer network essentials and enhance your networking skills by obtaining the CCENT certification
Become familiar with ICND1 (100-105) exam objectives, and learn how to get ready for the exam Key Features A step by step guide that will build you skills from basic concepts to completely understanding network communication Comprehensive coverage to help you implement the knowledge you've gained in real-world scenarios Take practice questions and mock tests to check how prepared you are for the CCENT exam Book DescriptionCCENT is the entry-level certification for those looking to venture into the networking world. This guide will help you stay up-to date with your networking skills. This book starts with the basics and will take you through everything essential to pass the certification exam. It extensively covers IPv4 and IPv6 addressing, IP data networks, switching and routing, network security, and much more-all in some detail. This guide will provide real-world examples with a bunch of hands-on labs to give you immense expertise in important networking tasks, with a practical approach. Each chapter consists of practice questions to help you take up a challenge from what you have procured. This book ends with mock tests with several examples to help you confidently pass the certification. This Certification Guide consists of everything you need to know in order to pass the ICND 1 100-105 Exam, thus obtaining a CCENT certification. However, practicing with real switches and routers or a switch or router simulator will help you succeed. What you will learn Get to grips with the computer network concepts Understand computer network components and learn to create a computer network Understand switching and learn how to configure a switch Understand routing and learn how to configure a router Understand network services and the maintenance process Learn how to troubleshoot networking issues Become familiar with, and learn how to prepare for, the ICND1 100-105 exam Who this book is forIf you are a Network Administrator, Network Technician, Networking professional, or would simply like to prepare for your CCENT certification, then this book is for you. Some basic understanding of networks and how they work would be helpful. Sufficient information will be provided to those new to this field.
https://magrudy-assets.storage.googleapis.com/9781788621434.jpg
31.490000 USD

CCENT/CCNA: ICND1 100-105 Certification Guide: Learn computer network essentials and enhance your networking skills by obtaining the CCENT certification

by Bekim Dauti
Paperback
Book cover image
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager Current Branch. A team of expert authors offers step-by-step, end-to-end coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager Current Branch for their requirements, and then deploy and ...
System Center Configuration Manager Current Branch Unleashed
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager Current Branch. A team of expert authors offers step-by-step, end-to-end coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager Current Branch for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager Current Branch and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager Current Branch's most important feature sets. You'll find detailed, expert coverage of these and many other topics: Managing clients and compliance Creating and managing applications, deployment types, packages, and programs Distributing and deploying applications and packages Managing software updates Integrating Intune Hybrid Managing mobile devices Providing conditional access Protecting endpoints Querying and reporting with Configuration Manager Deploying operating systems Enforcing security and delegation Performing backup, recovery, and maintenance The first book on Configuration Manager 2016, System Center Configuration Manager Current Branch Unleashed joins Sams' market-leading series of books on Microsoft's System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide.
https://magrudy-assets.storage.googleapis.com/9780672337901.jpg
62.990000 USD

System Center Configuration Manager Current Branch Unleashed

by Michael Wiles, Kenneth van Surksum, Greg Ramsey, Saud Al-Mishari, Gerry Hampson, Kerrie Meyler
Paperback
Book cover image
The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the ...
Autonomous Control for a Reliable Internet of Services: Methods, Models, Approaches, Techniques, Algorithms, and Tools
The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area. It was prepared as a Final Publication of the COST Action IC1304 Autonomous Control for a Reliable Internet of Services (ACROSS) . The book contains 14 chapters and is a show-case of the main outcomes of the Action in line with its scientific goals. The book can serve as a valuable reference for undergraduate students, post-graduate students, educators, faculty members, researchers, engineers, and research strategists, working in this field.
https://magrudy-assets.storage.googleapis.com/9783319904146.jpg
135.450000 USD

Autonomous Control for a Reliable Internet of Services: Methods, Models, Approaches, Techniques, Algorithms, and Tools

Paperback
Book cover image
This comprehensive guide has been fully updated to cover the latest features and tools of Oracle Real Application Clusters 12c Through clear instruction and detailed examples, Oracle Database 12c Real Application Clusters Handbook: Concepts, Administration, Tuning & Troubleshooting teaches how to build, configure, and maintain a dynamic enterprise computing infrastructure. ...
Oracle Database 12C Oracle Real Application Clusters Handbook: Concepts, Administration, Tuning & Troubleshooting
This comprehensive guide has been fully updated to cover the latest features and tools of Oracle Real Application Clusters 12c Through clear instruction and detailed examples, Oracle Database 12c Real Application Clusters Handbook: Concepts, Administration, Tuning & Troubleshooting teaches how to build, configure, and maintain a dynamic enterprise computing infrastructure. This thoroughly revised edition covers best uses for the latest tools and features-all from the practical standpoint of a working DBA. You will discover how to prepare hardware, configure the software, optimize data integrity, and integrate seamless failover protection. Brand-new flex and large cluster technologies are explained in full detail, and readers will get complete solutions for securing data and continuing business operations in the event of hardware failure. Presents all the new information needed to effectively use Oracle Real Application Clusters 12c -considered the most radical overhaul ever Offers detailed coverage of troubleshooting, performance tuning, and application development
https://magrudy-assets.storage.googleapis.com/9780071830485.jpg
68.250000 USD

Oracle Database 12C Oracle Real Application Clusters Handbook: Concepts, Administration, Tuning & Troubleshooting

by Sam R. Alapati, K Gopalakrishnan
Paperback
Book cover image
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. The move to cloud computing is no longer merely a topic of discussion; it has become a core competency that every modern business needs to embrace and ...
Research Advances in Cloud Computing: 2017
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. The move to cloud computing is no longer merely a topic of discussion; it has become a core competency that every modern business needs to embrace and excel at. It has changed the way enterprise and internet computing is viewed, and this success story is the result of the long-term efforts of computing research community around the globe. It is predicted that by 2026 more than two-thirds of all enterprises across the globe will be entirely run in cloud. These predictions have led to huge levels of funding for research and development in cloud computing and related technologies. Accordingly, universities across the globe have incorporated cloud computing and its related technologies in their curriculum, and information technology (IT) organizations are accelerating their skill-set evolution in order to be better prepared to manage emerging technologies and public expectations of the cloud, such as new services.
https://magrudy-assets.storage.googleapis.com/9789811050251.jpg
146.990000 USD

Research Advances in Cloud Computing: 2017

Hardback
Book cover image
This book introduces formal modeling and analysis of distributed systems by means of executable formal modeling in rewriting logic and model checking analyses in the tool Maude. The first part of the book introduces classical equational algebraic specification and term rewrite systems, including reasoning about confluence and termination, as well ...
Formal Modeling and Analysis of Distributed Systems: An Introduction Based on Executable Modeling in Maude: 2017
This book introduces formal modeling and analysis of distributed systems by means of executable formal modeling in rewriting logic and model checking analyses in the tool Maude. The first part of the book introduces classical equational algebraic specification and term rewrite systems, including reasoning about confluence and termination, as well as equational logic. The second part introduces rewriting logic and deals with the executable formal modeling of distributed systems. The book develops executable formal Maude models of classic distributed systems, which are then simulated and are further analysed through reachability analysis in Maude. In particular, the book shows how Maude can be used to break the Needham-Schroeder Public Key cryptographic protocol. Finally, the book introduces (linear) temporal logic that can be used to express complex requirements that distributed systems must satisfy and it uses Maude LTL model checker to analyze whether our models satisfy desired temporal properties.
https://magrudy-assets.storage.googleapis.com/9781447166863.jpg
73.490000 USD

Formal Modeling and Analysis of Distributed Systems: An Introduction Based on Executable Modeling in Maude: 2017

by Peter Csaba Olveczky
Paperback
Book cover image
Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications
https://magrudy-assets.storage.googleapis.com/9783319797472.jpg
115.490000 USD

Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications

by Dietmar P. F. Moller
Paperback
Book cover image
CCNA Cybersecurity Operations Course Booklet
https://magrudy-assets.storage.googleapis.com/9781587134371.jpg
46.05 USD

CCNA Cybersecurity Operations Course Booklet

by Cisco Networking Academy
Paperback
Book cover image
Contemporary Consumer Health Informatics
https://magrudy-assets.storage.googleapis.com/9783319798684.jpg
188.990000 USD

Contemporary Consumer Health Informatics

Paperback
Book cover image
Big Data Concepts, Theories, and Applications
https://magrudy-assets.storage.googleapis.com/9783319802114.jpg
167.990000 USD

Big Data Concepts, Theories, and Applications

Paperback
Book cover image
Cloud Computing: Theory and Practice: Second Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and ...
Cloud Computing: Theory and Practice
Cloud Computing: Theory and Practice: Second Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing. Specific topics covered include resource virtualization, resource management and scheduling, and advanced topics like the impact of scale on efficiency, cloud scheduling subject to deadlines, alternative cloud architectures, and vehicular clouds. An included glossary covers terms grouped in several categories, from general to services, virtualization, desirable attributes and security.
https://magrudy-assets.storage.googleapis.com/9780128128107.jpg
88.71 USD

Cloud Computing: Theory and Practice

by Dan C. Marinescu
Paperback
Book cover image
This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS, discussing the benefits and disadvantages of such systems, ...
Mobile Payment Systems: Secure Network Architectures and Protocols
This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS, discussing the benefits and disadvantages of such systems, and the entities that underpin them; reviews the mobile devices and operating systems currently available on the market, describing how to identify and avoid security threats to such devices; examines the different models for mobile payments, presenting a classification based on their core features; presents a summary of the most commonly used cryptography schemes for secure communications; outlines the key challenges in MPS, covering security for ubiquitous mobile commerce and usability issues; highlights the opportunities offered by mobile cloud computing and vehicular ad hoc networks in the design and development of MPS.
https://magrudy-assets.storage.googleapis.com/9783319230320.jpg
146.990000 USD

Mobile Payment Systems: Secure Network Architectures and Protocols

by Sherali Zeadally, Jesus R. Tellez
Hardback
Book cover image
Today, enterprise IT organizations must operate as relevant, transparent, and competitive businesses within a business to build trusted partnerships with their enterprise customers. Cisco's IT as a Service (ITaaS) Solution offers a proven Service Delivery model for addressing this challenge, responding rapidly to change, and managing all suppliers, including public ...
Cisco's it as a Service (ITaaS) Solution: It Services Delivery Model & Guide to Operating the it Organization Like a Competitive Business
Today, enterprise IT organizations must operate as relevant, transparent, and competitive businesses within a business to build trusted partnerships with their enterprise customers. Cisco's IT as a Service (ITaaS) Solution offers a proven Service Delivery model for addressing this challenge, responding rapidly to change, and managing all suppliers, including public cloud providers. Cisco's IT as a Service (ITaaS) Solution provides an in-depth understanding of every component of today's ITaaS Service Delivery Model, and helps you transform theory into practice to start driving value from ITaaS. Leading enterprise IT consultant Justin Mann shows how to: * Design an end-to-end ITaaS Service Delivery model around your business strategy * Establish an effective Services Taxonomy, Service Portfolio, and Service Roles & Responsibilities * Implement TCO and cost modeling strategies that enable informed high-level decision making * Establish metrics that correlate service performance to business outcomes * Proactively prepare services for -- and respond quickly to -- changing business requirements * Strengthen partnerships between the CIO, service owners, and business leaders * Link to and complement existing IT O&M and Enterprise Architecture practices Throughout, sidebars help you follow the IT Service Transformation Journey from beginning to end, and sample templates, dashboards, and project plans help you plan and pursue your own transformation.
https://magrudy-assets.storage.googleapis.com/9781587145018.jpg
62.990000 USD

Cisco's it as a Service (ITaaS) Solution: It Services Delivery Model & Guide to Operating the it Organization Like a Competitive Business

by Justin Mann
Paperback
Book cover image
Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications ...
Advances in Delay-Tolerant Networks (Dtns): Architecture and Enhanced Performance
Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds.
https://magrudy-assets.storage.googleapis.com/9780081016565.jpg
367.500000 USD
Paperback
Book cover image
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and matured: older books on the topic are severely out of date. IP Multicast Architectures offers comprehensive guidance for deploying modern IP multicast systems of all kinds: ...
IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and matured: older books on the topic are severely out of date. IP Multicast Architectures offers comprehensive guidance for deploying modern IP multicast systems of all kinds: basic and advanced, enterprise and service provider. Focused on Cisco devices and technologies,IP Multicast Architectures addresses common features, deployment models, and field best practices. Each section offers immersive real-world explanations of multicast theory, and present multiple case studies showcasing best-practice multicast design methodologies. Each case study is carefully crafted to offer pragmatic first-hand guidance for building the right network for each environment and set of applications. Coverage includes Layer 2 and Layer 3 multicast; routing, forwarding, domains, inter-domain routing, wireless multicast forwarding, Inter-AS, mVPN, mVRF, cloud mVPN transport, and much more. Throughout, the authors' configurations, designs, features, and parameters reflect all that's been learned since IP multicast first became widespread.
https://magrudy-assets.storage.googleapis.com/9781587144936.jpg
73.490000 USD

IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design

by Arvind Durai, Ray Blair, Josh Loveless
Paperback
Book cover image
This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless networks, the Internet (specifically the TCP/IP protocol), the domain name system (DNS), web servers and the HTTP/HTTPS protocols, web caches and various proxy server protocols, establishing IP addresses, and cloud computing. The book also includes forms ...
Internet Infrastructure: Networking, Web Services, and Cloud Computing
This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless networks, the Internet (specifically the TCP/IP protocol), the domain name system (DNS), web servers and the HTTP/HTTPS protocols, web caches and various proxy server protocols, establishing IP addresses, and cloud computing. The book also includes forms of encryption technologies, securing networks and servers, network analysis tools, load balancing, mechanisms for redundancy, and more. Each concept chapter is followed by a case study chapter to illustrate the concepts presented. The case study chapters are set up so that readers can install servers and experiment with their configurations.
https://magrudy-assets.storage.googleapis.com/9781138039919.jpg
187.69 USD

Internet Infrastructure: Networking, Web Services, and Cloud Computing

by Wei Hao, Richard Fox
Hardback
Book cover image
This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising ...
Networks of the Future: Architectures, Technologies, and Implementations
This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising opportunities and challenges which are also discussed in the book. It will also help researchers and graduate students to explore the latest research and trends in computer networking.
https://magrudy-assets.storage.googleapis.com/9781498783972.jpg
187.69 USD

Networks of the Future: Architectures, Technologies, and Implementations

Hardback
Book cover image
Computer Networking Problems and Solutions: An Innovative Approach to Building Resilient, Modern Networks
https://magrudy-assets.storage.googleapis.com/9781587145049.jpg
95.54 USD

Computer Networking Problems and Solutions: An Innovative Approach to Building Resilient, Modern Networks

by Russ White
Paperback / softback
Book cover image
Packed with a wealth of hands-on activities, MCSA GUIDE TO IDENTITY WITH WINDOWS SERVER 2016, EXAM 70-742 empowers students to successfully pass the MCSE/MCSA certification exam while also equipping users to face the real-world challenges of a Microsoft networking professional. This engaging full-color presentation emphasizes the skills necessary to configure ...
McSa Guide to Identity with Windows Server 2016, Exam 70-742
Packed with a wealth of hands-on activities, MCSA GUIDE TO IDENTITY WITH WINDOWS SERVER 2016, EXAM 70-742 empowers students to successfully pass the MCSE/MCSA certification exam while also equipping users to face the real-world challenges of a Microsoft networking professional. This engaging full-color presentation emphasizes the skills necessary to configure identity management with Windows Server 2016. Comprehensive coverage highlights advanced Active Directory configuration and management, Group Policy, Certificate Services, Identity federation, Web Application Proxy and Active Directory Rights Management. Hands-on labs and skill-reinforcing case projects offer extensive opportunities for your students to apply what they learn in real practice.
https://magrudy-assets.storage.googleapis.com/9781337400893.jpg
157.450000 USD

McSa Guide to Identity with Windows Server 2016, Exam 70-742

by Greg Tomsho
Paperback
Book cover image
Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used ...
Compressed Sensing in Li-Fi and Wi-Fi Networks
Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used as a comprehensive manual for teaching and research in courses covering advanced signal processing, efficient data processing algorithms, and telecommunications. After a thorough review of the basic theory of compressed sensing, many mathematical techniques are presented, including advanced signal modeling, Nyquist sub-sampling of analog signals, the non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models.
https://magrudy-assets.storage.googleapis.com/9781785482007.jpg
209.87 USD

Compressed Sensing in Li-Fi and Wi-Fi Networks

by Mokhtari Hatem, Hadj Batatia, Malek Benslama
Hardback
Book cover image
Deploying ACI is your start-to-finish insider's guide to designing, deploying, and managing Cisco ACI solutions for the next-generation data center. Authored by three leading Cisco architects and engineers, it will help you smoothly migrate to Cisco's world-class VXLAN solution, building on all you already know about networking, virtualization, and data ...
Deploying ACI: The Complete Guide to Planning, Configuring, and Managing Application Centric Infrastructure
Deploying ACI is your start-to-finish insider's guide to designing, deploying, and managing Cisco ACI solutions for the next-generation data center. Authored by three leading Cisco architects and engineers, it will help you smoothly migrate to Cisco's world-class VXLAN solution, building on all you already know about networking, virtualization, and data centers.

The authors' detailed descriptions and step-by-step tutorials are designed to help you confidently leverage the full power of the ACI architecture in your real-world environment, as you become a true expert. Coverage includes: Understanding what ACI is and what it can do for your organization Building a fabric and bringing it to life Integrating virtualization and external routing technologies Discovering how life is different once ACI is running Planning for scalable performance and hardware multi-tenancy Integrating L4-7 services Centralizing and simplifying policy management with Cisco APIC Moving to application-centric networking Using Cisco Application Virtual Switch (AVS) at the virtual network edge Integrating physical and virtual infrastructure Operating multi-site environments Implementing end-to-end security and whitelisting Providing centralized visibility with real-time, application health monitoring Troubleshooting ACI infrastructure Getting started with data center programmability, automation, and orchestration

https://magrudy-assets.storage.googleapis.com/9781587144745.jpg
56.29 USD

Deploying ACI: The Complete Guide to Planning, Configuring, and Managing Application Centric Infrastructure

by Frank Dagenhardt
Paperback
Book cover image
Cisco Firepower Threat Defense (Ftd): Advanced Troubleshooting and Configuration Best Practices for Sourcefire Technologies
https://magrudy-assets.storage.googleapis.com/9781587144806.jpg
95.54 USD

Cisco Firepower Threat Defense (Ftd): Advanced Troubleshooting and Configuration Best Practices for Sourcefire Technologies

by Nazmul Rajib
Paperback / softback
Book cover image
The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or ...
Concurrency Control in Distributed System using Mutual Exclusion
The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.
https://magrudy-assets.storage.googleapis.com/9789811055584.jpg
167.990000 USD

Concurrency Control in Distributed System using Mutual Exclusion

by Samiran Chattopadhyay, Nabendu Chaki, Sukhendu Kanrar
Hardback
Book cover image
The goal of this book is to crystallize the emerging mobile computing technologies and trends into positive efforts to focus on the most promising solutions in services computing. Many toys built today are increasingly using these technologies together and it is important to understand the various research and practical issues. ...
Computing in Smart Toys: 2018
The goal of this book is to crystallize the emerging mobile computing technologies and trends into positive efforts to focus on the most promising solutions in services computing. Many toys built today are increasingly using these technologies together and it is important to understand the various research and practical issues. The book will provide clear proof that mobile technologies are playing an ever increasing important and critical role in supporting toy computing, which is a new research discipline in computer science. It is also expected that the book will further research new best practices and directions in toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is mainly intended for researchers and students working in computer science and engineering, and for toy industry technology providers, having particular interests in mobile services. The wide range of authors of this book will help the various communities understand both specific and common problems. This book facilities software developers and researchers to become more aware of this challenging research opportunity. As well, the book is soliciting shall provide valuable strategic outlook on the emerging toy industry.
https://magrudy-assets.storage.googleapis.com/9783319620718.jpg
146.990000 USD

Computing in Smart Toys: 2018

Hardback
Book cover image
This book introduces the reader to the optical switching technology for its application to data centers. In addition, it takes a picture of the status of the technology and system architecture evolution and of the research in the area of optical switching in data center. The book is organized in ...
Optical Switching in Next Generation Data Centers
This book introduces the reader to the optical switching technology for its application to data centers. In addition, it takes a picture of the status of the technology and system architecture evolution and of the research in the area of optical switching in data center. The book is organized in four parts: the first part is focused on the system aspects of optical switching in intra-data center networking, the second part is dedicated to describing the recently demonstrated optical switching networks, the third part deals with the latest technologies developed to enable optical switching and, finally, the fourth part of the book outlines the future prospects and trends.
https://magrudy-assets.storage.googleapis.com/9783319610511.jpg
188.990000 USD

Optical Switching in Next Generation Data Centers

Hardback
Book cover image
The workbenches of hobbyists, hackers, and makers have become overrun with microcontrollers, computers-on-a-chip that power homebrewed video games, robots, toys, and more. In Making Things Talk, Tom Igoe, one of the creators of Arduino, shows how to make these gadgets talk. Whether you need to connect some sensors to the ...
Making Things Talk: Using Sensors, Networks, and Arduino to See, Hear, and Feel Your World
The workbenches of hobbyists, hackers, and makers have become overrun with microcontrollers, computers-on-a-chip that power homebrewed video games, robots, toys, and more. In Making Things Talk, Tom Igoe, one of the creators of Arduino, shows how to make these gadgets talk. Whether you need to connect some sensors to the Internet or create a device that can interact wirelessly with other creations, this book shows you what you need. Although they are powerful, the projects in this book are inexpensive to build: the Arduino microcontroller board itself ranges from around $25 to $40. The networking hardware covered here includes Ethernet, Wi-Fi, Bluetooth, and can be had for $25 to $50. Fully updated for the latest Arduino hardware and software, this book lets you combine microcontrollers, sensors, and networking hardware to make things...and make them talk to each other!
https://magrudy-assets.storage.googleapis.com/9781680452150.jpg
42.00 USD

Making Things Talk: Using Sensors, Networks, and Arduino to See, Hear, and Feel Your World

by Tom Igoe
Paperback
Page 1 of 40