Network hardware Books

253 products


  • Digital Phase Modulation Applications of Communications Theory

    Springer Us Digital Phase Modulation Applications of Communications Theory

    15 in stock

    Book Synopsis1. Introduction.- 2. Signal Analysis and an Overview of Modulation Methods.- 3. Error Performance.- 4. Spectral Performance.- 5. Energy-Bandwidth Comparisons and Shannon Theory for Phase Modulation.- 6. Transmitters.- 7. Receivers.- 8. Simplified Receivers.- 9. Synchronization.- 10. Partially Coherent Receivers.- 11. Phase Modulation and Convolutional Codes.- Appendix A. Minimum Distance Calculation Algorithms.- A.1. Limited Sequential Tree Search.- A.2. The Viterbi Algorithm in a Superstate Trellis.- B.1. A Markov Distance Chain.- Appendix C. Simulation Techniques.- C.1. Statistical Analysis of Error Events.- C.2. The Signal Space Method of Simulation.- Appendix D. Tables of Optimum Codes.- D.1. Optimal Codes for Binary and Quaternary CPFSK.- D.2. Optimal Codes for 8-, 16- and 32-Level CPFSK.Table of Contents1. Introduction.- 2. Signal Analysis and an Overview of Modulation Methods.- 3. Error Performance.- 4. Spectral Performance.- 5. Energy-Bandwidth Comparisons and Shannon Theory for Phase Modulation.- 6. Transmitters.- 7. Receivers.- 8. Simplified Receivers.- 9. Synchronization.- 10. Partially Coherent Receivers.- 11. Phase Modulation and Convolutional Codes.- Appendix A. Minimum Distance Calculation Algorithms.- A.1. Limited Sequential Tree Search.- A.2. The Viterbi Algorithm in a Superstate Trellis.- B.1. A Markov Distance Chain.- Appendix C. Simulation Techniques.- C.1. Statistical Analysis of Error Events.- C.2. The Signal Space Method of Simulation.- Appendix D. Tables of Optimum Codes.- D.1. Optimal Codes for Binary and Quaternary CPFSK.- D.2. Optimal Codes for 8-, 16- and 32-Level CPFSK.

    15 in stock

    £313.49

  • Satellite Communication Systems Design

    Springer Science+Business Media Satellite Communication Systems Design

    1 in stock

    Book Synopsis1. Signals.- 2. Causes of Signal Impairment.- 3. Baseband Signal Processing.- 4. Services.- 5. Quality of Service.- 6. System Outline.- 7. Orbits and Controlled Trajectories.- 8. Radio-Frequency Design Issues.- 9. Analog Transmission.- 10. Digital Transmission.- 11. Bidirectional Circuit Design.- 12. Channel-Access Schemes.- 13. Networking.- 14. System Economics.- 15. Future Developments.- Appendix 1. Radio Regulations Provisions.- I. Introduction.- II. Frequency Allocations.- III. Interference Coordination.- A. Modes of Interference between Space and Terrestrial Services.- B. Modes of Interference between Stations of Different Space Systems in Frequency Bands with Separated Earth-to-Space and Space-to-Earth Allocations.- C. Modes of Interference between ESs of Different Space Systems in Frequency Bands for Bidirectional Use.- IV. Radiation Limitations.- References.- Appendix 2. Frequency Sharing among Fixed-Satellite Service Networks.- I. Interference Evaluation to Determine if CoordiTable of ContentsSignals; E. Saggese, S. Tirró. Causes of Signal Impairment; S. Tirró. Source Signal Processing; E. Saggese. Services; A. Puccio. Quality of Service; A. Puccio, et al. System Outline; A. Bonetto, et al. Orbits and Controlled Trajectories; V. Violi, G. Vulpetti. Radiofrequency Design Issues; A. Bonetto, E. Saggese. Analog Transmission; S. Tirró. Digital Transmission; F. Ananasso, et al. Bidirectional Circuits Design; S. Tirró. Channel Access Schemes; A. Vernucci. Networking; S. Tirró. System Economics; S. Tirró. Future Developments; G. Chiassarini, et al. Index.

    1 in stock

    £134.99

  • Handbook of PeertoPeer Networking

    Springer Handbook of PeertoPeer Networking

    1 in stock

    Book SynopsisPeer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications.Trade ReviewFrom the reviews:“This handbook serves as a foundation work on P2P networks covering a broad spectrum of topics … . Within each subject area, many notable researchers contribute their seminal work to make up the contents. Hence this volume is invaluable not only to those primarily doing research in P2P network technologies, but also to those interested in network-related issues and their impact on society. Summing Up: Recommended. Graduate students and above.” (J. Y. Cheung, Choice, Vol. 48 (1), September, 2010)Table of ContentsPart 1: Introduction to Peer-to-Peer Networking: Peer-to-Peer Networking and Applications: Synopsis and Research Directions John Buford, Heather Yu.- The social impact of P2P systems Andrea Glorioso, Ugo Pagallo, Giancarlo Ruffo.- From Client- Server to P2P Networking Lu Liu, Nick Antonopoulos.- Examining the Use of Peer-to-Peer Networks from an Activity Perspective Jorn De Boever, Dirk De Groof.- Part 2: Unstructured P2P Overlay Architectures: Unstructured Peer-to-Peer Network Architectures Xing Jin, S.-H. Gary Chan.- Exchanging Peers to Establish P2P Networks Mursalin Akon, Mohammad Towhidul Islam, Xuemin Shen, Ajit Singh.- Peer-to-Peer Topology Formation Using Random Walk Kin-Wah Kwong, Danny H.K. Tsang.- Semantic Social Overlay Networks Alexander Lser, Steffen Staab, Christoph Tempich.- Part 3: Structured P2P Overlay Architectures: Overview of Structured Overlay Algorithms Krishna Dhara, Yang Guo, Mario Kolberg, Xiaotao Wu.- Distributed Hash Tables: Design and Applications C.-F. Michael Chan, S.-H. Gary Chan, - The Gamut of Bootstrapping Mechanisms for Structured Overlay Networks Anwitaman Datta.- Network Aware DHT-based P2P Systems Marguerite Fayçal, Ahmed Serhrouchni.- On Adding Structure to Unstructured Overlay Networks João Leitão, Nuno A.Carvalho, José Orlando Pereira, Rui Oliveira, Luis Rodrigues.- Mathematical Modeling of Routing in DHTs Peter Kersch, Robert Szabo.- Part 4: Search and Query Processing: Keyword Search in Unstructured P2P Networks Dingyi Han, Yong Yu.- Distributed Search and Pattern Matching Reaz Ahmad, Raouf Boutaba.- Distributed Semantic Overlay Networks Christos Doulkeridis, Akrivi Vlachou, Kjetil Nørvåg, Michalis Vazirgiannis.- Self-adaptation and Self-organization for Search in Social-like Peer-to-Peer Networks LuLiu, Jie Xu, Duncan Russell, Zongyang Luo.- Data Sharing in P2P Systems Rabab Hayek, Guillaume Raschia, Patrick Valduriez, Noureddine Mouaddib.- Managing Linguistic Data Summaries in Advanced P2P Applications R.Hayek, G. Raschia, P. Valduriez, N. Mouaddib.- Case Study: Scoop for Partial Read from P2P Database Farnoush Banaei-Kashani, Cyrus Shahabi.- Part 5: Incentive Mechanisms: Incentive Mechanisms for Cooperation in Peer-to-Peer Networks Daniel A. G. Manzato, Nelson L. S. da Fonseca.- Bandwidth Trading as Incentive Kolja Eger, Ulrich Killat.- Part 6: Trust, Anonymity, and Privacy: Reputation-based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy Loubna Mekouar, Youssef Iraqi, Raouf Boutaba.- P2P Reputation Management Through Social Networking Zoran Despotovic .- State of the Art in Trust and Reputation Models in P2P Networks Felix Gómez Mármol, Gregorio Martinez Pérez.- Anonymity in P2P Systems Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sanchez-Aarnoutse.- Private Peer-to-Peer Network Michael Rogers, Saleem Bhatti.- Part 7: Broadcast and Multicast Services: Gossip-based Broadcast João Leitão, José Pereira, Luís Rodrigues.- Employing Multicast in P2P Overlay Networks Mario Kolberg.- Multicast Services Over Structured P2P Networks P. Manzanares-Lopez, J. Malgosa-Sanahuja, J.P. Muñoz-Gea, J. Sanchez-Aarnoutse.- Multicast Routing in Structured Overlays and Hybrid Networks Matthias Wählisch, Thomas C. Schmidt.- Multicast and Bulk Lookup in Structured Overlay Networks Ali Ghodsi.-Part 8: Multimedia Content Delivery: Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks J. De Boever, D. De Grooff.- Live video and IP-TV Maria Luisa Merani, Daniela Saladino.- Providing VoD streaming using P2P networks J. P. Muñoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, J. C. Sanchez-Aarnoutse.- Part 9: Mobile P2P: Peer-to-Peer Overlay in Mobile Ad-hoc Networks Marcel C. Castro, Andreas J. Kassler, Carla-Fabiana Chiasserini, Claudio Casetti, Ibrahim Korpeoglu.- Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks Mooi-Choo Chuah, Jian-bin Han.- The MOBI-DIK Approach to

    1 in stock

    £314.99

  • Methods and Procedures for the Verification and

    Springer-Verlag New York Inc. Methods and Procedures for the Verification and

    1 in stock

    Book SynopsisNeural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. This volume introduces some of the methods and techniques used for the verification and validation of neural networks and adaptive systems.Table of ContentsBackground of the Verification and Validation of Neural Networks.- Augmentation of Current Verification and Validation Practices.- Risk and Hazard Analysis for Neural Network Systems.- Validation of Neural Networks Via Taxonomic Evaluation.- Stability Properties of Neural Networks.- Neural Network Verification.- Neural Network Visualization Techniques.- Rule Extraction as a Formal Method.- Automated Test Generation for Testing Neural Network Systems.- Run-Time Assessment of Neural Network Control Systems.

    1 in stock

    £85.88

  • Information Theory and Network Coding Information

    Springer-Verlag New York Inc. Information Theory and Network Coding Information

    5 in stock

    Book SynopsisThis book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy.Trade ReviewFrom the reviews: "This book could serve as a reference in the general area of information theory and would be of interest to electrical engineers, computer engineers, or computer scientists with an interest in information theory. Each chapter has an appropriate problem set at the end and a brief paragraph that provides insight into the historical significance of the material covered therein. … Summing Up: Recommended. Upper-division undergraduate through professional collections." (J. Beidler, Choice, Vol. 46 (9), May, 2009) "The book consisting of 21 chapters is divided into two parts. Part I, Components of Information Theory … . Part II Fundamentals of Network Coding … . A comprehensive instructor’s manual is available. This is a well planned comprehensive book on the subject. The writing style of the author is quite reader friendly. … it is a welcome addition to the subject and will be very useful to students as well as to the researchers in the field." (Arjun K. Gupta, Zentralblatt MATH, Vol. 1154, 2009)Table of ContentsThe Science of Information.- The Science of Information.- Fundamentals of Network Coding.- Information Measures.- Information Measures.- Zero-Error Data Compression.- Weak Typicality.- Strong Typicality.- Discrete Memoryless Channels.- Rate-Distortion Theory.- The Blahut–Arimoto Algorithms.- Differential Entropy.- Continuous-Valued Channels.- Markov Structures.- Information Inequalities.- Shannon-Type Inequalities.- Beyond Shannon-Type Inequalities.- Entropy and Groups.- Fundamentals of Network Coding.- The Max-Flow Bound.- Single-Source Linear Network Coding: Acyclic Networks.- Single-Source Linear Network Coding: Cyclic Networks.- Multi-source Network Coding.

    5 in stock

    £71.99

  • Wireless Sensor Networks

    John Wiley & Sons Inc Wireless Sensor Networks

    15 in stock

    Book SynopsisThis book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing WSN applications are described, followed by discussing the ongoing research efforts on some WSNs applications that show the usefulness of sensor networks. Theoretical analysis and factors influencing protocol design are highlighted.Trade Review"It is intended for advanced students but also would be useful for researchers, system and chip designers, and other professionals in related fields." (Booknews, 1 February 2011) "The book is written in an accessible, textbook style, and includes problems and solutions to assist learning." (Dark Fiber, 8 February 2011)Table of ContentsAbout the Series Editor xvii Preface xix 1 Introduction 1 1.1 Sensor Mote Platforms 2 1.2 WSN Architecture and Protocol Stack 10 References 15 2 WSN Applications 17 2.1 Military Applications 17 2.2 Environmental Applications 21 2.3 Health Applications 26 2.4 Home Applications 29 2.5 Industrial Applications 31 References 33 3 Factors Influencing WSN Design 37 3.1 Hardware Constraints 37 3.2 Fault Tolerance 39 3.3 Scalability 40 3.4 Production Costs 40 3.5 WSN Topology 40 3.6 Transmission Media 41 3.7 Power Consumption 43 References 49 4 Physical Layer 53 4.1 Physical Layer Technologies 53 4.2 Overview of RF Wireless Communication 57 4.3 Channel Coding (Error Control Coding) 59 4.4 Modulation 62 4.5 Wireless Channel Effects 66 4.6 PHY Layer Standards 72 References 75 5 Medium Access Control 77 5.1 Challenges for MAC 77 5.2 CSMA Mechanism 80 5.3 Contention-Based Medium Access 83 5.4 Reservation-Based Medium Access 103 5.5 Hybrid Medium Access 110 References 115 6 Error Control 117 6.1 Classification of Error Control Schemes 117 6.2 Error Control in WSNs 120 6.3 Cross-layer Analysis Model 123 6.4 Comparison of Error Control Schemes 131 References 137 7 Network Layer 139 7.1 Challenges for Routing 139 7.2 Data-centric and Flat-Architecture Protocols 141 7.3 Hierarchical Protocols 148 7.4 Geographical Routing Protocols 152 7.5 QoS-Based Protocols 159 References 163 8 Transport Layer 167 8.1 Challenges for Transport Layer 167 8.2 Reliable Multi-Segment Transport (RMST) Protocol 169 8.3 Pump Slowly, Fetch Quickly (PSFQ) Protocol 171 8.4 Congestion Detection and Avoidance (CODA) Protocol 175 8.5 Event-to-Sink Reliable Transport (ESRT) Protocol 177 8.6 GARUDA 180 8.7 Real-Time and Reliable Transport (RT)2 Protocol 185 References 189 9 Application Layer 191 9.1 Source Coding (Data Compression) 191 9.2 Query Processing 195 9.3 Network Management 212 References 218 10 Cross-layer Solutions 221 10.1 Interlayer Effects 222 10.2 Cross-layer Interactions 224 10.3 Cross-layer Module 229 References 240 11 Time Synchronization 243 11.1 Challenges for Time Synchronization 243 11.2 Network Time Protocol 245 11.3 Definitions 246 11.4 Timing-Sync Protocol for Sensor Networks (TPSN) 248 11.5 Reference-Broadcast Synchronization (RBS) 251 11.6 Adaptive Clock Synchronization (ACS) 253 11.7 Time Diffusion Synchronization Protocol (TDP) 254 11.8 Rate-Based Diffusion Protocol (RDP) 257 11.9 Tiny- and Mini-Sync Protocols 258 11.10 Other Protocols 260 References 262 12 Localization 265 12.1 Challenges in Localization 265 12.2 Ranging Techniques 268 12.3 Range-Based Localization Protocols 272 12.4 Range-Free Localization Protocols 280 References 284 13 Topology Management 287 13.1 Deployment 288 13.2 Power Control 289 13.3 Activity Scheduling 296 13.4 Clustering 308 References 317 14 Wireless Sensor and Actor Networks 319 14.1 Characteristics of WSANs 321 14.2 Sensor–Actor Coordination 325 14.3 Actor–Actor Coordination 337 14.4 WSAN Protocol Stack 345 References 348 15 Wireless Multimedia Sensor Networks 349 15.1 Design Challenges 350 15.2 Network Architecture 353 15.3 Multimedia Sensor Hardware 357 15.4 Physical Layer 365 15.5 MAC Layer 367 15.6 Error Control 371 15.7 Network Layer 374 15.8 Transport Layer 379 15.9 Application Layer 383 15.10 Cross-layer Design 388 15.11 Further Research Issues 392 References 394 16 Wireless Underwater Sensor Networks 399 16.1 Design Challenges 401 16.2 Underwater Sensor Network Components 402 16.3 Communication Architecture 405 16.4 Basics of Underwater Acoustic Propagation 409 16.5 Physical Layer 414 16.6 MAC Layer 416 16.7 Network Layer 426 16.8 Transport Layer 435 16.9 Application Layer 437 16.10 Cross-layer Design 437 References 440 17 Wireless Underground Sensor Networks 443 17.1 Applications 445 17.2 Design Challenges 447 17.3 Network Architecture 450 17.4 Underground Wireless Channel for EM Waves 453 17.5 Underground Wireless Channel for Magnetic Induction 463 17.6 Wireless Communication in Mines and Road/Subway Tunnels 466 17.7 Communication Architecture 474 References 480 18 Grand Challenges 483 18.1 Integration of Sensor Networks and the Internet 483 18.2 Real-Time and Multimedia Communication 484 18.3 Protocol Stack 485 18.4 Synchronization and Localization 485 18.5 WSNs in Challenging Environments 486 18.6 Practical Considerations 488 18.7 Wireless Nano-sensor Networks 488 References 489 Index 491

    15 in stock

    £79.16

  • CompTIA PenTest PT0001 Cert Guide

    Pearson Education CompTIA PenTest PT0001 Cert Guide

    1 in stock

    Book Synopsis Omar Santos is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. He has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the Worldwide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. Omar is an active member of the security community, where he leads several industrywide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies,

    1 in stock

    £31.99

  • Scalability Density and Decision Making in

    Cambridge University Press Scalability Density and Decision Making in

    1 in stock

    Book SynopsisThis cohesive treatment of cognitive radio and networking technology integrates information and decision theory to provide insight into relationships throughout all layers of networks and across all wireless applications. It encompasses conventional considerations of spectrum and waveform selection and covers topology determination, routing policies, content positioning and future hybrid architectures that fully integrate wireless and wired services. Emerging flexibility in spectrum regulation and the imminent adoption of spectrum-sharing policies make this topic of immediate relevance both to the research community and to the commercial wireless community. Features specific examples of decision-making structures and criteria required to extend network density and scaling to unprecedented levels Integrates sensing, control plane and content operations into a single cohesive structure Provides simpler and more powerful models of network operation Presents a unique approach to decisTrade Review'This is an extremely important text that comes at a critical time in the evolution of our understanding of both the characteristics of the spectrum need and the means by which this increasingly urgent need can be satisfied. [Marshall] has been one of the long term leaders in the development of the framework for dynamic spectrum access networks and cognitive radio technology, giving him a historic as well as current perspective on the challenges. The insights in this book should be of enormous value to students, active researchers, wireless systems developers, and regulatory and policy leaders.' Dennis A. Roberson, Illinois Institute of Technology'… highly original and brilliantly insightful. Preston Marshall has examined cognitive technologies under three essential key headings - scalability, density and decision-making. In doing this he unlocks the power of cognitive technologies and builds a realisable and compelling vision for communication networks of the future. Every section … is full of new ideas and insights that could only be written by someone who has been a leader in this field and has a handle on the bigger picture as well as a deep understanding of the technical details. This book is so far removed from the myriad of books that simple relate information to the reader. It is packed full of ideas, opinions and most crucially supporting evidence … a breath of fresh air … essential reading for someone who has any interest in how the challenges for communication systems of the future will be met.' Linda Doyle, University of Dublin'… a refreshing take … I strongly recommend this book to both scholars and experts in the field, and I am convinced that it will be frequently used as reference material for all interested in the future potential of cognitive wireless networks.' Shaunak Joshi, IEEE Communications MagazineTable of ContentsPreface; Part I. Overview: 1. Introduction; 2. Theoretical foundations; 3. Future wireless operation, environments and dynamic spectrum access; 4. Fundamental challenges in cognitive radio and wireless systems; Part II. Generalized Environmental Characterization: 5. The spectrum and channel environment; 6. Propagation modeling, characterization and control; 7. The connectivity environment; 8. The information and content environment; Part III. System Performance of Cognitive Wireless Systems: 9. Network scaling; 10. Network physical density limitations; 11. Network sensing and exchange information effectiveness; 12. Content access information effectiveness; 13. Minimizing nonlinear circuit effects; Part IV. Integrated Analysis and Decision-Making: 14. Awareness structure for cognitive wireless systems; 15. Instantiating and updating beliefs across wireless networks; 16. Decision-making structure for cognitive wireless systems; Part V. Summary: 17. Further research needs in cognitive wireless networks; Appendix A. Terms and acronyms; Appendix B. Symbols; Appendix C. Mathematica and MATLAB routines.

    1 in stock

    £112.10

  • Wireless Communications and Networking for

    Cambridge University Press Wireless Communications and Networking for

    1 in stock

    Book SynopsisA thorough treatment of UAV wireless communications and networking research challenges and opportunities. Detailed, step-by-step development of carefully selected research problems that pertain to UAV network performance analysis and optimization, physical layer design, trajectory path planning, resource management, multiple access, cooperative communications, standardization, control, and security is provided. Featuring discussion of practical applications including drone delivery systems, public safety, IoT, virtual reality, and smart cities, this is an essential tool for researchers, students, and engineers interested in broadening their knowledge of the deployment and operation of communication systems that integrate or rely on unmanned aerial vehicles.Trade Review'This book, written by the most prominent experts in the field, provides a complete in-depth analysis of UAV wireless communications. It should become a reference material for all the students, engineers and researchers who are building our next generation wireless communication networks.' Merouane Debbah, CentraleSupélec'This is the most comprehensive book on the rapidly evolving field of wireless communications and networking for UAVs. The authors are among the researchers who have made the most profound contributions to this emerging field. Their impressive command on the subject matter results in a thorough presentation taking theory, practice, and industrial standards into account. A must-read for researchers and engineers working in this field.' Halim Yanikomeroglu, Carleton University, OttawaTable of Contents1. Wireless communications and networking with unmanned aerial vehicles: an introduction; 2. UAV applications and use cases; 3. Aerial channel modeling and waveform design; 4. Performance analysis and tradeoffs; 5. Deployment of UAVs for wireless communications; 6. Wireless-aware path planning for UAV networks; 7. Resource management for UAV networks; 8. Cooperative communications in UAV networks; 9. From LTE to 5G NR-enabled UAV networks; 10. Security of UAV networks.

    1 in stock

    £99.75

  • BTEC Nationals Information Technology Student

    Pearson Education BTEC Nationals Information Technology Student

    15 in stock

    Book Synopsis

    15 in stock

    £33.10

  • An Introduction to Automatic Digital Computers

    Cambridge University Press An Introduction to Automatic Digital Computers

    15 in stock

    Book SynopsisOriginally published in 1960, this textbook is aimed at those without advanced mathematical training and provides a comprehensive introductory account of digital computers, what they are capable of doing and how they are made to do it. Throughout the book the emphasis is on the applications of computers to routine work rather than to advanced research.Table of ContentsList of plates; Preface to the first edition; Preface to the second edition; 1. The elements of programming; 2. Input, storage and output of numbers; 3. The organization of programmes; 4. The solution of engineering problems; References for further reading; Index.

    15 in stock

    £29.99

  • EGovernance

    Palgrave Macmillan EGovernance

    1 in stock

    Book SynopsisThe e-governance revolution is said to be changing everything, but will all the modelling tools, electronic meeting management systems and online consultations really change political judgement in policy formation? Using case studies from local and federal government in the US and Europe, Perri 6 examines these claims and presents a new theory of how policymakers use and reject information and do and don''t trust each other with information in using the new tools, before analyzing the implications for democracy.Trade Review'This is a path-breaking work on the actual and potential use of electronic tools in public sector decision making. It combines fascinating case studies on leading edge applications with a thought-provoking model of institutional styles of policy making, and challenges us to imagine how the various players in the model would incorporate these electronic tools into their work. It should be required reading for anyone concerned with the future of e-governance.' - Sandford Borins, Professor of Public Management, University of Toronto 'Governments everywhere are pushing the boundaries of technology. In this important new analysis, Perri 6 carefully charts the rise of this movement in political terms and its use in shaping the judgments of policy makers. He provides strong and persuasive arguments on a central puzzle of the information age: if and how it can strengthen governance. The book is a must-read for anyone interested in the effects of modern technology on government.' - Donald F. Kettl, University of Wisconsin, Madison, USATable of ContentsAcknowledgements Introduction The Scope of E-Governance Examples and Initiatives The Forward March of E-Governance Halted? What Difference Could E-Governance Make? Fears, Aspirations and Theories Conducting Policy Judgement Through Information Technologies: Three Cases Policy Making: The Work of Governance The Organization of Policy Makers and the Use of E-Governance Tools Institutional Styles and E-Governance Tools Ways Forward Conclusion Notes References

    1 in stock

    £40.49

  • Design Research in Information Systems Theory and

    Springer-Verlag New York Inc. Design Research in Information Systems Theory and

    1 in stock

    Book SynopsisIt is 5 years since the publication of the seminal paper on “Design Science in Information Systems Research” by Hevner, March, Park, and Ram in MIS Quarterly and the initiation of the Information Technology and Systems department of the Communications of AIS.Table of Contentsto Design Science Research.- Design Science Research in Information Systems.- Design Science Research Frameworks.- On Design Theory.- Twelve Theses on Design Science Research in Information Systems.- A Science of Design for Software-Intensive Systems.- People and Design.- Software Design: Past and Present.- Evaluation.- The Use of Focus Groups in Design Science Research.- Design and Creativity.- A Design Language for Knowledge Management Systems (KMS).- On Integrating Action Research and Design Research.- Design Science in the Management Disciplines.- Design Science Research in Information Systems: A Critical Realist Approach.- Design of Emerging Digital Services: A Taxonomy.- Disseminating Design Science Research.- Design Science Research: Looking to the Future.

    1 in stock

    £104.49

  • Information Systems Theory Explaining and Predicting Our Digital Society Vol 1 28 Integrated Series in Information Systems

    Springer New York Information Systems Theory Explaining and Predicting Our Digital Society Vol 1 28 Integrated Series in Information Systems

    15 in stock

    Book SynopsisThe second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others.Table of ContentsThe Updated DeLone and McLean Model of Information Systems Success.- If They Build It, Will They Come? The Technology Acceptance Model.- A Bibliometric Analysis of Articles Citing the Unified Theory of Acceptance and Use of Technology.- Why do People Reject Technologies: A Review of User Resistance Theories.- Task-Technology Fit Theory: A Survey and Synopsis of the Literature.- Migrating Processes from Physical to Virtual Environments: Process Virtualization Theory.- The Theory of Deferred Action: Purposive Design as Deferred Systems for Emergent Orgaisations.- Resource-based View Theory.- On the Business Value of Information Technology: A Theory of Slack Resources.- Portfolio Theory: The Contribution of Markowitz's Theory to Information System Area.- The Theory of the Lemon Markets in IS Research.- The Technology: Organization - Environment Framework.- Contingency Theory in Information Systems Research.- IT and Porter's Competitive Forces Model and Strategies.- Information Technology and Organisational Performance: Reviewing the Business Value of IT Literature.- Applying "Business Case" Construct Using the "Diffusion of Innovations" Theory Framework: Empirical Case Study in the Higher Edcuation.- Punctuated Equilibrium Theory in IS Research.- Discrepancy Theory Models of Satisfaction in is Research.- Institutional Change and Green IS: Towards Problem-driven, Mechanism-based Explanations.- A Multi-level Social Network Perspective on ICT Adoption.- Expectation Confirmation Theory in Information System Research: A Review and Analysis.- Stakeholder Theory & Applications in Information Systems.

    15 in stock

    £187.49

  • Integrating Serverless Architecture

    APress Integrating Serverless Architecture

    1 in stock

    Book Synopsis Design, develop, build, and deliver an end-to-end serverless architecture by leveraging Azure services, frameworks, and tools. This book offers a holistic approach, guiding you through the design and development of a Twitter Bot application, while leveraging Azure Functions. Integrating Serverless Architecture begins with an overview of serverless computing and getting started with Azure Functions. Here, you will create a Twitter bot function which scans Twitter for the latest tweets and makes use of dependency injection. Further, you will learn about Azure Cosmos DB where you will cover its change feed mechanism and the repository pattern. You will create a Cosmos DB trigger-based tweet notifier function, which will broadcast the latest tweets to connected clients. You will explore the basics of Azure Service Bus and create a tweet scheduler function, which will prioritize different keywords for the Twitter bot function. Along the way, you will debug, deliverTable of Contents 1. New Era of Serverless Computing · Introduction to Serverless Computing · Introduction to Twitter Bot application · Scope of Work · Technologies to be Used · Logical Architecture · Physical Architecture · Software Prerequisites · Summary · References 2. Getting Started with Azure Functions · Understanding Azure Functions · Explore Tweetinvi Library and interact with Twitter · Create a Tweet Bot Function · Debug the Azure Function · Logging support in Azure Function · Deploy the Function to Azure · Exercises · Summary · References 3. Explore Azure Cosmos DB and its Change feed mechanism · Introduction to Azure Cosmos DB · Azure Cosmos DB Repository Pattern · Sample CRUD Operations · Integrate with Tweet Bot Function · Understand Change Feed mechanism · Implement Azure Cosmos DB Trigger Function · Exercises · Summary · References 4. Secure Secrets in Azure Key Vault · Introduction to Azure Key Vault · Store Secrets in Key Vault · Access Secrets in Azure Functions from Key Vault · Summary · References 5. Getting Started with Azure SignalR Service · Introduction to Azure SignalR Service · Create a SignalR Service · Integrate with Azure Cosmos DB Trigger Function · Summary · References 6. Create Tweet Bot Web Application · Getting started with .NET Core · Create a Web application with Materialize CSS · Integrate with Tweetinvi to display list of Hashtags · Save User Preference to Cosmos DB · Display latest tweets from Cosmos DB · Integrate with Azure SignalR Service and display real-time notifications · Deploy to Azure Web App Service · Exercises · Summary · References 7. Enable App Service Authentication on Azure Functions · Introduction to App Service Authentication · Enable App Service Authentication on Azure Web App · Enable App Service Authentication on Azure Functions · Integrate Authentication flow from Web app to Azure Functions · Exercises · Summary · References 8. Configuring Continuous Integration and Continuous Deployment to Azure Environment · Design a Continuous Integration and Deployment pipeline · Create VSTS and Check-in the Source Code · Create Build Definition · Create Release Definition · Testing the CI/CI Pipeline · Provisioning and configuring our Azure Function infrastructure (optional) · Extending Twitter Bot Exercises 9. Setup Continuous Integration and Continuous Deployment pipeline for Azure Functions

    1 in stock

    £49.49

  • Pro PowerShell for Amazon Web Services

    APress Pro PowerShell for Amazon Web Services

    4 in stock

    Book SynopsisAmazon Web Services (AWS) is the leading public cloud platform. In this book you will learn to use Microsoft PowerShell to create, host, manage, and administer workloads using Amazon Web Services. You will learn how to create virtual machines, provision storage, configure networks, and more-all using your preferred Windows scripting language.CIOs everywhere are leading their organizations to the cloud, but there are few books available to help. This book focuses on moving Microsoft Windows workloads to the cloud using technologies familiar to enterprise Microsoft-based professionals.The completely revised and expanded Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads on Amazon Web Services. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few years ago. Tasks that traditionally took weeks of work, costing thousands of dollars, can be completed in minutes for a fraction of a penny.New chapters in this second edition cover: AWS Lambda, Amazon WorkSpaces, Amazon AppStream 2.0, AWS Directory Service, Amazon WorkDocs, and AWS System Manager.What You''ll Learn Create and manage Windows servers on Elastic Compute Cloud (EC2) Configure and secure networks with Virtual Private Cloud (VPC) Leverage autoscaling to adjust resources as load changes Deploy and manage SQL Server using the Relational Database Service (RDS) Manage virtual desktops using WorkSpaces and AppStream Leverage AWS Systems Manager to manage Windows at scale Who This Book Is ForWindows professionals who want to learn more about Amazon Web Services, with a focus on running Windows workloads and automated management at scale using PowerShell tools for AWS. The book assumes you have knowledge of Windows and PowerShell, but are new to AWS.Table of Contents

    4 in stock

    £49.49

  • Practical Guide to Salesforce Experience Cloud

    APress Practical Guide to Salesforce Experience Cloud

    5 in stock

    Book SynopsisWhether you are brand new to the world of digital experiences on the Salesforce platform or you are looking to take your Experience Cloud (previously Community Cloud) knowledge to the next level, this detailed guide will help you build and manage a Salesforce site by leveraging the declarative power of the platform with clicks, not code. Each Salesforce site/community is a part of a widespread ecosystem, with thousands of sites and millions of users active today on Experience Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways. Author Philip Weinmeister, Salesforce MVP and the only recipient of the Community Cloud MVP Trailblazer award from Salesforce, leads you through the ins and outs of Salesforce Experience Cloud and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform. This completely revised editioTable of ContentsChapter 1: Why Digital Experiences on the Salesforce Platform? (REVISED) Chapter 2: Planning and Preparing for Success with Experience Cloud (REVISED) Chapter 3: Experience Cloud Licenses and Member Groups: Employees, Partners, and Customers (REVISED) Chapter 4: Experience Cloud Template Types: Tabs, Visualforce, and Lightning (REVISED) Chapter 5: Experience Builder (REVISED) Chapter 6: Experience Pages and Components (REVISED) Chapter 7: Experience Setup, Administration, and Workspaces (REVISED) Chapter 8: Access, Sharing, and Visibility in Experiences (REVISED) Chapter 9: Topics in Experiences (REVISED) Chapter 10: Knowledge (Articles) in Experiences (REVISED) Chapter 11: Process Automation in Experiences (REVISED) Chapter 12: Experience Audience Targeting and Personalization (REVISED) Chapter 13: Lightning Bolt for Experience Cloud (REVISED) Chapter 14: Salesforce CMS (Content) in Experiences (NEW) Chapter 15: B2B and B2C Commerce within Experience Cloud (NEW) Chapter 16: The Community/Experience Cloud Consultant Certification Exam (NEW) Chapter 17: The Best of the Rest: Additional Experience Cloud Topics

    5 in stock

    £28.49

  • Third Generation Internet Revealed

    APress Third Generation Internet Revealed

    2 in stock

    Book SynopsisThis book covers the inexorable exhaustion of the IPv4 address space, the interim fix to this based on Network Address Translation (NAT) and Private Addresses, and the differences between IPv4 and IPv6. It will help you understand the limitations and problems introduced by the use of NAT and introduce you to the far simpler network and software designs possible, using a larger, unified address space.IPv6, a mature and viable replacement for IPv4, is currently used by more than 36% of all global Internet traffic. Wireless telephone service providers in many countries have migrated their networks to IPv6 with great success. The elimination of NAT and Private Addresses has vastly simplified network design and implementation. Further, there are now enough public addresses allocated to accommodate all anticipated uses for the foreseeable future.Most networking products and software, especially open-source software, are already fully IPv6 compliant. Today, no business shTable of Contents1. Introduction 2. History of Computer Networks up to IPv4 3. Review of IPv4 4. The Depletion of the IPv4 Address Space 5. IPv6 Deployment Progress 6. IPv6 Core Protocols 7. IPSec and IKEv2 8. Transition Mechanisms 9. IPv6 on Mobile Devices 10. DNS 11. The Future of Messaging with No NAT 12. IPv6 Related Organizations 13. IPv6 Projects

    2 in stock

    £40.49

  • Visual Data Insights Using SAS ODS Graphics

    APress Visual Data Insights Using SAS ODS Graphics

    1 in stock

    Book SynopsisSAS ODS graphics users will learn in this book how to visually understand and communicate the significance of data to deliver images for quick and easy insight, with precise numbers. Many charts or plots require the viewer to run the eye from a bar end or plot point to some point on an axis, and then to interpolate between tick marks to estimate the value. Some design choices can lead to wrong conclusions or mistaken impressions. Graphic software relies on defaults to deliver something if you make a minimal effort, but that something is not likely to be exactly what you want. Visual Data Insights Using SAS ODS Graphics provides examples using experience-based design principles. It presents examples of bar charts, pie charts, and trend lines or time series plots, the graph types commonly used in business, other organizations, and the media for visual insight into data. Newer graphs are also included: dot plots, needle plots, waterfall charts, butterfly chaTable of ContentsIntroduction About this book Part I: Design Principles Chapter 1: Principles of Communication-Effective Graphic Design A. Joseph Pulitzer on Communication (principles for Press are universally applicable) B. Accelerate/Facilitate Visual Data Insights with Simplicity C. The Effects of Needless Complexity D. Simplicity E. Elegance F. Sparse Image Focuses Attention G. Sparse Graph more easily, more quickly interpreted H. Whenever possible, make graph title a headline I. Text readability—often wrongly assumed by graph creators J. Is what the creator sees what the viewer sees? K. How assure text readability L. We read horizontally M. Axis Labels N. Image Plus Precise Numbers—Both Are Necessary O. Annotation or On-Image Table P. Sparse Line Annotation Q. Y Axis for Time Series Plots R. Ranking and Subsetting Information S. Scrolling on Web Graphs T. Maximizing Information Delivery in Titles and Subtitles U. 3D Chapter 2: Principles of Communication-Effective Use of Color A. When and Why Color: Communication, Not Decoration B. Benefits of Boring Black and White C. Contrast with Background D. Always Bad Backgrounds 1) Image Backgrounds (continuous tone color) 2) Color Gradient Backgrounds 3) Textured Backgrounds E. Visual Dominance F. Other Choices for Text Emphasis G. Monitor Color vs HardCopy Color H. Consistency I. Purpose/Significance Assumed Even If Unintended J. Color-Coding K. Thickness of Lines and Text L. Size of Plot Markers and Legend Color Blocks M. Maximum Number of Distinguishable Shades of One Hue N. Other Tips O. Color Control with ODS Graphics Attribute Maps P. Multi-Line Plot That Obviates Need for a Legend Part II: Widely Applicable Examples You Can Use Chapter 3: Technical Introduction A. Outer Structure of ODS Graphics Code in Examples B. Inner Structure of ODS Graphics Code in Examples C. Text Parts of ODS Graphics Images D. Borders E. From Defaults through Customization for a Simple Example F. What Follows Chapter 4: Charts for Data in Categories A. Getting Your Charts In Order B. Pie Charts 1) The Perils of Pie Charts a) 3D Pie Charts are ALWAYS misleading b) Labels Can Collide If All Outside c) Labels Can Be Hard To Read If Inside If Insufficient Color Fill Contrast d) Slices Too Small To Be Seen Are Not Necessarily a Problem e) Reason to Avoid the OTHER Collective Pie Slice 2) Pie Chart Alternatives a) Default Colors vs Better Background for Inside-Of-Slice Labels b) All Inside Labels c) All Outside Labels for Name/Category, Value, Percent d) Label Collisions Problem e) Collision Problem Solved f) Maximally Informative CallOut Labels g) Default Legend h) Maximally Informative Legend i) The Ineffable Incontrovertible Insightful Power of Simplicity: The Pac-Man Pie Chart—the Extremes of Other C. Donut Charts D. Horizontal Bar Charts 1) Default Chart 2) Easy Bar Annotation 3) Adding Percent of Total Measurement 4) Key Design Principles a) Ranking; Show Them What’s Important b) Subsetting: Let Part Stand for the Whole 5) The Maximally Informative Horizontal Bar Chart 6) Interlinked Subsets Images Only 7) A Tall Horizontal Bar Chart: The Complement of a Subset 8) “Nested” Bar Charts (Web Charts) 9) Clustered Bar Chart 10 Dot Chart 11 When to use alphabetical order for bar labels 12 ButterFly Chart E. Vertical Bar Charts 1) Basic 2) Alternative to the Always Unsatisfactory Stacked Bar Chart 3) Bar Over Bar (Overlay) Chart 4) Needle Plot 5) WaterFall Charts F. Panels of Bar Charts G. Other Charts Data with a Single Categorical Key 1) Series Chart with Block Chart 2) Needle Plot with Block Chart H. Single Categorical Key But Two Measurement Variables: Vertical Bar Chart with Overlaid Line Chart I. Charts for Two Categorical Keys 1) Bubble Chart 2) Heat Map a) Default b) Improved c) Alternative with Simpler Code Chapter 5: Plots for Time-Dependent Data A. Best Use of Vertical Axis Space B. CurveLabels vs Legend C. Single-Line Plots 1) Simple 2) Band Plot 3) With Band As OverLay “Companion” to Highlight Part of Plotted Area D. All the ways to present a v e r y l o n g plot E. Multiple Line Plots Concurrently Displayed 1) Overlaid 2) Overlaid and Using Line Color Control 3) Overlaid and Using Data Labels and, to Eliminate Need for Legend, Curve Labels 4) Overlaid and Using XAxis Table, No Legend or CurveLabels Needed 5) In a Panel F. The Ineffable Incontrovertible Insightful Power of Simplicity: Annotated SparseLines 1) Single 2) Stacked or Paneled G. Spark Tables - SparkLines Used in a Table H. Other Ways To Present Time Series Data 1) Needle Plot 2) Step Plot 3) High-Low Open-Close Plot for Virtual Multi-Line Plot I. Vertical Bar Charts to Show Date/Time Dependence J. Animation To Show Time Evolution K. Other Alternatives to Providing Numbers 1) Limiting Labels to Y Values by Using Needle Plot to Get to X axis precisely 2) Use DropLines to Both Axes 3) Using TEXT Statements 4) Using ODS Graphics Annotation [LIGHT HERE, a usage example is provided for the US By-State Population Map] L. When all on-image annotation methods are infeasible, or declined 1) Web Graph Linked to Excel Table and Back 2) Graph and Table Composite in Excel WorkSheet 3) Graph and Table Composite in PowerPoint Slide 4) Graph and Table Composite in Word Document 5) Graph and Table Composite in PDF File Chapter 6: Looking for Relationships between Two Variables A. Scatter Charts 1) SGSCATTER with PLOT Statement vs SGPLOT with SCATTER Statement 2) Annotation with DataLabels 3) Highly Informative DataLabels 4) DropLines Instead of DataLabels 5) Annotation with the TEXT Statement 6) PROC SGSCATTER Panel of One Y Variable vs Two X Variables 7) PROC SGSCATTER Panel of Two Y Variables vs One X Variable 8) PROC SGSCATTER Panel of Three Y Variables vs One X Variable 9, 10, 11) Use PROC SGPANEL and SCATTER statement to create above examples—possibly retain just this solution 12} Overlay of Two Scatter Plots for Different Values of a Categorical Variable (e.g., Gender) to See Correlations and Differences in the y-x Relationship 13) SGPANEL of two Gender-Specific SCATTER plots for data in Item 12 13) Horizontal or Vertical Panel of the Above Overlay with the Two Individual Scatter Plots as Companion Images for Clarity 15) Annotated Scattter Plot using SGPLOT and SCATTER Statement 16) Add x values to annotation and suppress the superfluous axis 17) Replace y,x annotation with names of people whose data is plotted 18) Maximal annotation with Name, y, x 19) SGPANEL other examples TBD, maybe none B. Fit and Confidence Plots 1) Introduction 2) ELLIPSE 3) Linear Regression Plot 4) Cubic Regression Plot 5) LOESS Fit 6) SPLINE 7) Penalized B-Spline Plot C. VLINE Plus VBAR on the Same Chart Chapter 7: Distribution of a Single Variable A. Histogram 1) Basic 2) With Density Plot 3) With Fringe Plot B. Density Plot with Fringe Plot C. Box Plots Chapter 8: Maps for Data with Geographic Keys A. Examples for various types of unit area 1) By Country 2) By State 3) By County 4) By Point Location, such as City B. Rationales for Range Setting for the Measurement Reported C. Automating implementation of the rationale D. Annotating the map for maximal information communication E. The “For Color” Map Problem Solved—Color Coding for Maps F. What to do for a unit area that is too tiny to be readily visible Part III: Other Features Chapter 9: Ways to Enhance Your Graph A. Attribute Maps B. Reference Lines C. Inserting Text with INSET and TEXT Statements Chapter 10: Other Ways To Deliver Data Visualization A. Graph and Table Composite in Excel WorkSheet B. Graph and Table Composite in & Other Examples in PowerPoint Slides C. Graph and Table Composite in Word Document D. Graph and Table Composite in PDF File E. So you want to build an InfoGraphic 1) Creating the elements as individual images 2) Assembling a composite from those images 3) Creating an image file from the slide Chapter 11: Miscellaneous Tips A. Positioning of Titles in ODS Graphics Images B. Title and Footnote Text Handling in Web Graphs C. Pseudo-3D Effects That Introduce No Distortion or Needless Complexity Part IV: Appendixes Appendix A: Additional Resources 1. SAS-Institute-provided Documentation 2. Other Resources at support.sas.com 3. Online Conference Proceedings (not available from SAS Institute) 4. Online Newsletters 5. Blogs 6. Others TBD Appendix B: Possible Lengthy Code for Some Examples

    1 in stock

    £41.24

  • Serverless Beyond the Buzzword

    APress Serverless Beyond the Buzzword

    1 in stock

    Book SynopsisKnow how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.Deployment automation and DevOps Table of ContentsAbout the author Acknowledgements Prologue Who is this book for? Technical levels used in this book What will you learn? Amazon Web Services (AWS) Second edition Chapter 1: Serverless basics What is Serverless architecture? Microservices Serverless example History of Serverless Types of projects Key challenges Key benefits Common objections Public case studies Chapter 2: Strategy Introduction Traditional organization structure vs Serverless Cloud Centre of Excellence (CCoE) Cloud controls as compliance guardrails Supporting tools Serverless adoption: current state Serverless adoption: desired state Serverless adoption: gap analysis Application suitability for Serverless Event Storming Public case studies Chapter 3: Finances Total Cost of Ownership (TCO) The value of paying for utilization The cost to develop Serverless The cost of migrating applications The cost of maintenance and operations Estimating the cloud operational costs Collecting the input data for an estimate Calculating the estimate Cost management Cost optimization Chapter 4: Security Shared responsibility Serverless security Principle of Least Privilege IAM Policy tips Security for cloud users Security for microservices User input validation Storing credentials Encryption Protecting Data Securing Databases Privacy and GDPR Security monitoring with ElectricEye Chapter 5: People Serverless roles Serverless roles: Solution Architect Serverless Roles: Cloud Security Engineer Serverless Roles: Deployment Automation Engineer Serverless roles: Full Stack Developer Serverless roles: Database Engineer Serverless training Serverless team structure Working with Serverless vendors Vetting Serverless capabilities Chapter 6: DevOps & Tooling What is DevOps? Infrastructure as Code AWS CloudFormation AWS CloudFormation planning Terraform AWS Serverless Application Model (SAM) AWS Amplify AWS Cloud Development Kit (CDK) CDK technical considerations Serverless Framework Code Repositories GIT Submodules Developer Tooling Code quality assurance Chapter 7: Data Data is a valuable asset Database selection Event Sourcing Data tenancy Relational Database Service (RDS) Redshift Serverless DynamoDB NoSQL Serverless NoSQL databases Managed NoSQL databases NoSQL databases comparison In-memory databases AppSync Simple Storage Solution (S3) Elastic File System (EFS) Chapter 8: Logging & Testing Logging Reactive Logging Proactive Logging Logging format and content Log types in the cloud Cloud logging services CloudWatch Exporting logs to S3 CloudWatch Subscriptions Managed services for proactive logging Error Monitoring Performance Optimisation Cost Tracking Security Monitoring Logging Best Practices Testing Testing Challenges in Serverless Types of Tests Asynchronous Testing Risk Assessment for Testing Test Pyramid vs Test Honeycomb Contract Testing for Serverless Deployment Pipeline AWS Testing Services Chapter 9: Architecture Challenges & mitigations AWS: Microservices AWS: Application Programming Interface (API) Design patterns Microservice example architectures Stateless architecture Decoupling microservices AWS: Decoupling Event-driven architecture Asynchronous design pattern Containers AWS: Edge AWS: Internet of Things (IoT) AWS: Managed Machine Learning (ML) AWS: Ledger Technology AWS: Call Centre Well-Architected Framework Serverless tips Chapter 10: Case studies Introduction Proactive logging Serverless data lake Video analysis Serverless Minecraft Dynamic live streaming SEO-friendly website and CMS Virtual host True Serverless containers Epilogue References

    1 in stock

    £41.24

  • Creating Business Applications with Microsoft 365

    APress Creating Business Applications with Microsoft 365

    1 in stock

    Book SynopsisLearn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You''ll work with an eTable of ContentsChapter 1. Programming in the Power Platform In this chapter, we will cover the basics of programming: properties, methods, and events. We will then look at how their implementation differs between in each of the Power Platform applications compared with traditional environments like .NET (Windows Forms and ASP.NET) and JavaScript. For Power Apps, we will see how you can set the properties of other objects directly but instead need to make the value of what you want to change (such as the text of a button) a variable and then change the value of that variable elsewhere in the application. We will also explore its Visual Basic-like syntax. In Power Automate, we will look at the different types of actions (variables, loop, parallel branches, conditions, etc.). Finally, in Power BI we will look at the Power Query M formula language. Chapter 2. Updating a SharePoint List Using Power Apps Chapter 3. Creating an Approval Process with Power Automate Chapter 4. Creating a Survey Response Dashboard with Microsoft Power BI Chapter 5. Creating a Survey Solution with Microsoft Forms, Flow, SharePoint, and Power BI Chapter 6. Power BI Challenges with JSON, XML, and Yes/No Data Chapter 7. Power BI Case Study: Monitoring BMC Remedy Help Tickets Chapter 8. Building a Help Ticketing System in PowerApps and SharePoint – New Ticket Form Chapter 9. Continuing the Help Ticketing System – Technician Form Chapter 10. Using Power BI for the Help Ticketing System Chapter 11. Overcoming Power Apps Delegation Issues with SharePoint Data Sources In this chapter, we look at how to use the technique described in https://tinyurl.com/twzvbgl to overcome delegation limits in Power Apps using a SharePoint data source. We also implement a corresponding Power Automate Flow to copy the ID value to a numeric column each time we create a record. Chapter 12. Creating a Class Sign-Up Solution in SharePoint and Power Apps Chapter 13. Visualizing Learning Management Data from SQL Server using Power BI This chapter gives several examples of connecting to multiple tables in a SQL Server database in order to visualize test score, completion, assignments and similar learning management data. It demonstrates custom columns, merging tables, slicers, and much more. Chapter 14. Dynamic Information in Power Apps and Sending an Adaptive Card to Teams using Power Automate In this chapter, we create linked SharePoint lists that display status levels, colors, and associated steps. We then read these lists from PowerApps to create a status display that we display in a tab in Teams. Finally, we create a Power Automate flow so that each time the status changes, we automatically post that to our Teams channel. Chapter 15. Dynamically Setting Object Properties in Power Apps Based on a SharePoint List In this chapter, we explore how to approximate dynamic object references/reflection in Power Apps. We take an "Actions" list in SharePoint and use it to set Text, Tooltip, and Visible properties of each corresponding button in Power Apps. Chapter 16. Uploading Files from PowerApps to SharePoint and Emailing Links using Power Automate In this chapter, we see how to upload multiple attachments from Power Apps to a SharePoint document library using Power Automate. While we are in Power Automate, we create an email of links to these documents and email it to the designated recipient. Chapter 17. Working with SharePoint Lookup Columns in Power BI In this chapter, we explore how to use the FieldValuesAsText functionality in Power BI to get the data from within a SharePoint Lookup column. We also explore creating custom columns and filtering by Content Type. Chapter 18. Joining SharePoint/Excel Tables in Power BI This chapter shows two different examples on how to join data in Power BI to make effective visualizations. The first example shows how to access lookup columns in SharePoint lists by doing a join on the lists once you bring them into Power BI. The second one is an extended example on how to verify data between two Excel spreadsheets that share a common value. We first show how to accomplish the task with Microsoft Access with a join query and a set of custom columns that reflect whether columns between the two spreadsheets actually match. We then show how it is easier and more reproducible with later data to do the same thing with Power BI using a merge query. Chapter 19. Copying Microsoft Forms Answers to SharePoint using Power Automate and then Showing the Most Current Submission in Power BI In this chapter, we take a simple Microsoft Form, copy each entry to SharePoint with Power Automate, and then visualize the data in Power BI. The main insight on the Power BI side is to show only the most recent form submission by grouping within Power BI, creating a MaxDate column, and then filtering. Chapter 20. Copying Microsoft Forms Attachments to a SharePoint List Item using Power Automate In this chapter, we see how to create a group form in Microsoft Forms, create an associated SharePoint List to hold the data, use Power Automate to copy the form responses to the list, and, most importantly, copy each file uploaded with the form and attach it to the corresponding list item. Chapter 21. Creating an Employee Recognition App in Power Apps, Power Automate, Power BI, Teams, and SharePoint In this chapter, we demonstrate how to create a Power Apps and Power Automate employee recognition solution that can post the recognition to a Teams channel, send a Teams chat, and/or send via email. We try to make it optional for submitters to include their information, finding it works for chats and email but not posts. We store the information in SharePoint and then use Power BI to visualize the values demonstrated and other data. Chapter 22. Creating a Reservations Booking Solution in Power Apps and SharePoint In this chapter, we demonstrate how to create a SharePoint list of available appointments and then use Power Apps to allow users to select an available appointment and make that not available to anyone else. It also shows how to allow users to edit or delete their appointments (or those created on their behalf). Chapter 23. Creating a Scoring Application in Power Apps and SharePoint In this chapter, we create a scoring application where we patch three different SharePoint records at the same time. Along the way, we use cascading drop-down lists, collections, data tables, and variables.

    1 in stock

    £37.49

  • Connecting the Internet of Things

    APress Connecting the Internet of Things

    1 in stock

    Book SynopsisNavigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution to a viable product. This book guides you through this fractured landscape with real world examples and projects that can be leverage for an IoT product.Backed by an overview of IoT use cases and key connectivity elements of IoT solutions, you'll gain an understanding of the breadth of the IoT landscape and the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies. You'll also be able to understand the essentials of connectivity including, hardware, software, and business models.?IoT is essential for increasing productivity of many industries and quality of life (making the world smart and autonomous). Both wired and wireless connectivity technologies are essential ingredients in an IoT product. Writtenby Intel engineers and architects, Connecting the Internet of ThingsunTable of ContentsChapter 1: Introduction to IoT ConnectivityChapter Goal: This chapter provides an overview of key IoT use cases and key connectivity elements of IoT solutions. The reader will get an understanding of the breadth of the IoT landscape.• Purpose of this book• Background and Terminology• Key IoT use caseso Smart citieso Asset trackingo Smart factorieso Industrialo Transportationo Digital surveillance systemso Retailo Medical o Indoor location• End-to-end IoT building blockso Things/devices/sensorso Edge/Gateway/Fogo Cloud• IoT Stakeholders/Value Chaino Chip Vendorso Module Vendorso System Integratorso ODMso ISVso End CustomersChapter 2: Considerations in choosing a connectivity technologyChapter Goals: This chapter highlights the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies and also discusses the tradeoffs between different wireless technologies and network topologies. Also, this chapter provides the motivation for using wireless technologies in IoT products as well as challenges.• Compute and connect are integral functions that are fully integrated in single SoC-for lower cost and low power solutions• Benefits of wireless• Seamless wireless connectivity for mobility applications• Remote Commissioning, ease of deployment, OTA update, device identification• Challenges of Wireless Connectivity• Fragmentation of the IoT Ecosystemo Discussion of IoT Framework Open Connectivity Foundation etc.o Interoperability (open standards)• Coexistence and interference• Wireless security is vital• Certification (Industry, regulatory, operator)o Certified labs• Antenna design challenges• Considerations in choosing a connectivity technologyo Energy/power/cost tradeoffso Selection of network architectures and topologieso Wireless standards and alignment to use cases-how to choose the right wireless protocol for the jobo Selection criteria-range, data rate, power, security, latency, capacity, etc.• Wireless Standard BodiesSubchapter Goal: Overview of Connectivity standards including 15.4, ZigBee, Thread, 6LoWPAN, wi-fi, BT, LTE, 5G etc. and which is appropriate for each use case; include cost considerationso WiFi Allianceo BT SIGo ZigBee Allianceo Thread Groupo Dot doto Z-Waveo 3GPP (ITU-T)Chapter Goals: The following chapters (3 to 10) provide a deep dive on each connectivity technology and considerations on selecting it for the IoT use casesChapter 3: Wi-Fi • Wi-Fi mesh• WiFi 802.11a/b/g/n/ac• WiFi 6Chapter 4: Bluetooth• BLE• BT mesh• BT direction finding• BT beaconsChapter 5: 802.15.4 (unlicensed)• ZigBee• ThreadChapter 6: LPWAN• Lora• SigFoxChapter 7: Cellular Technologies • NB IoT• 3G• 4G LTE• CBRS (Private LTE) / OnGoChapter 8: 5G• eMBB• mMTC• urLLC• 5G TSNChapter 9: Ethernet• TSN• Industrial Ethernet TechnologiesChapter 10: GNSSChapter 11: IoT Connectivity Frameworks and StacksChapter Goal: This chapter goes into detail on how to assemble all of the components of a working solution and discusses how to scale your solution to a product• Software stacks, drivers, operating systems, RTOS• Gateway architecture including protocolso IoT protocols CoAP MQTT OPCUA• RF: antenna, PA, etc.• Coexistence• Environmental considerations, reliability, long life etc.• Security and privacy• Managing the network• Certification• Putting it together• How to integrate and validate (chip vs pre-certified module)• Scaling from project to product • Putting it together: Sample Projects• Go through the earlier examples and discuss the complete productsChapter 12: The Future of IoT ConnectivityChapter Goal: This chapter discusses emerging connectivity technologies for addressing new use cases as well as advancing and optimizing the performance of existing technologies• Things/sensors (low power, battery powered, low compute, need wireless connectivity, small memory footprint, small RTOS footprint)• Software defined radio• What is coming next?• Future technologies: Wi-Fi 7, etc.• Next steps for the reader• Where to get more informationReferencesIndex

    1 in stock

    £41.24

  • Introducing Cisco Unified Computing System

    APress Introducing Cisco Unified Computing System

    1 in stock

    Book SynopsisThe Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy. So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it. You''ll stTable of ContentsChapter 1: Setting up UCSPE ( Cisco UCS Platform Emulator)Chapter Goal: To set up UCSPE No of pages 20 Sub -Topics 1. Downloading UCSPE 2. Importing UCSPE into VMWare 3. Starting UCSPE 4. Real-world UCS setup Chapter 2: The hardware chapter Chapter Goal: An explanation of the different hardware that makes up a UCS (Cisco Unified Computing System) No of pages: 20 Sub - Topics 1. The Fabric Interconnect 2. Chassis and IOMs 3. FEX 4. Blade servers 5. Rackmount servers Chapter 3: Northbound Networking and SAN Chapter Goal: To understand the UCS in relation to the rest of the network No of pages: 10 Sub - Topics 1. Physical connectivity and port-channels 2. VLANs Chapter 4: Policies Chapter Goal: To create the policies we need for chapter 4 No of pages : 20 Sub - Topics: 1. Policies 2. Storage Policies 3. Dynamic vNIC connection policies 3. vNIC/vHBA Placementpolicies 4. vMedia policies 5. Server boot policies 6. Maintenance Policies 7. Server Pool policies 8. Operation policies Chapter 5: Service Profiles and Templates Chapter Goal: To use the policies we have to create service profiles and assign them to our servers No of pages: 30 Sub - Topics: 1. Creating an Organization 2. Creating a Service Profile Template 3. Creating a Service Profile from a template 4. Assigning templates Chapter 6: UCS Security Chapter Goal: to Secure our UCS environment No of pages: 20 Sub - Topics 1. AAA 2. Hardening the web interface 3. Hardening SSH Chapter 7: Troubleshooting Chapter Goal: to Secure our UCS environment No of pages: 20 Sub - Topics 1. Error messages 2. SNMP 3. Call-home

    1 in stock

    £37.49

  • Salesforce Field Service

    APress Salesforce Field Service

    5 in stock

    Book SynopsisSalesforce Field Service (formerly Field Service Lightning) connects customers, workforce, and products on a single platform to deliver exceptional on-site services. This book guides Field Service enthusiasts in creating, managing, and automating support with use cases and real-time examples. You will learn Salesforce Field Service which will help you better manage your customers, internal users, and field technicians. As you advance, you'll learn the whole end-to-end life cycle of creating work orders, associating service appointments to work orders, scheduling and dispatching service appointments to field technicians, and completing the work orders. By the end of this book, you'll be able to implement, test and deploy Salesforce Field Service for both Desktop and Mobile apps. What you'll learn Basics of Field Service Field Service objects and data model Field Service schedulingand optimization Configuring Salesforce Field Service Managing Salesforce Field ServiceTable of ContentsChapter 1: Intro to Salesforce Field Service · Basics of Field Service and Field Service Life Cycle · Field Service Personas, Objects and Data Model · Common Field Service Terminology · How Salesforce can help build Field Service and understanding Salesforce Licenses Chapter 2: Step by Step Field Service Implementation · Installing Field Service Managed App Exchange Package · Using Field Service Guided Setup · Using Dispatcher Console for dispatching Service Appointments Chapter 3: Extending Field Service to Mobile · Configuring Field Service Mobile App · How Field Technicians use Mobile App Chapter 4: Reporting in Field Service · Configure Reports and Dashboards to understand Field Service performance Chapter 5: Cracking Salesforce Field Service Lightning Certification · Understanding exam outline, key tips and strategies

    5 in stock

    £40.49

  • Connecting Networks v6 Labs  Study Guide Lab

    Pearson Education Connecting Networks v6 Labs Study Guide Lab

    4 in stock

    Book Synopsis

    4 in stock

    £51.04

  • BTEC Level 3 National IT Student Book 1

    Pearson Education Limited BTEC Level 3 National IT Student Book 1

    1 in stock

    Book SynopsisResources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.

    1 in stock

    £33.09

  • Testbeds and Research Infrastructures for the Development of Networks and Communities: 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings

    Springer Nature Switzerland AG Testbeds and Research Infrastructures for the Development of Networks and Communities: 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 13th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communications, TridentCom 2018, held in November 2018 in Shanghai, China. The 10 full papers were selected from 29 submissions and are grouped into three sessions: wireless and testbed application; uncertainty analytics and formal verification; knowledge graph.Table of ContentsBig Data Science and Applications.- Big Data and Cloud Computing.- Big Data Outsourcing.- Security and privacy in Big Data.- Big Data Testbeds and Applications in Industries.- Cyber Physical Systems and Applications: Smart Homes, Smart Health, Smart Grids and Green Cities.- Connected Vehicles, Internet of Things, and Industrial Control Systems.- Security and privacy in IoT & CPS.- Next Generation Service Oriented Architectures & Web 2.0 Services.- Emerging Technology in networking and Communications.- Emerging Wired, Wireless and Optical Communication technology.- Virtualized Network and Data Center Network.- Software-Defined Network Testbeds.- Crowd Sourcing, Crowd Sensing and IoT.- Testbeds for Big data, CPS or Emerging Networking technology.- Testbed Development, Operations and Management.- Testbed Experiences in Big data, CPS or Emerging Networking Technology.- Experimental Facilities for Big data Testbeds.- Methodologies and Tools of Testbeds Performance Evaluation.

    1 in stock

    £34.19

  • Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedings

    Springer Nature Switzerland AG Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2018, held in Ho Chi Minh City, Vietnam, in December 2018. The 13 revised full papers were carefully reviewed and selected from 28 submissions. The papers are organized thematically in tracks, starting with security and privacy, telecommunication systems and networks, networks and applications.Table of ContentsImproving Privacy for GeoIP DNS Traffic.- Deep Reinforcement Learning based QoS-aware Routing in Knowledge-defined networking.- 3 Throughput optimization for multirate multicasting through association control in IEEE 802.11 WLAN.- An NS-3 MPTCP Implementation.- A Novel Security Framework for Industrial IoT based on ISA 100.11a.- Social-aware Caching and Resource Sharing Optimization for Video Delivering in 5G Networks.- Energy Efficiency in QoS Constrained 60 GHz Millimeter-Wave Ultra-dense Networks.- Priority-based Device Discovery in Public Safety D2D Networks with Full Duplexing.- Modified Direct Method for Point-to-Point Blocking.- Probability in Multi-service Switching Networks with Resource Allocation Control.- Inconsistencies among Spectral Robustness Metrics.- QoS criteria for energy-aware switching networks.- Modelling Overflow Systems with Queuing in Primary.- Exploring YouTube’s CDN Heterogeneity.

    1 in stock

    £34.19

  • High-Performance Modelling and Simulation for Big Data Applications: Selected Results of the COST Action IC1406 cHiPSet

    Springer Nature Switzerland AG High-Performance Modelling and Simulation for Big Data Applications: Selected Results of the COST Action IC1406 cHiPSet

    1 in stock

    Book SynopsisThis open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.Table of ContentsWhy High-Performance Modelling and Simulation for Big Data Applications Matters.- Parallelization of hierarchical matrix algorithms for electromagnetic scattering problems.- Tail Distribution and Extreme Quantile Estimation using Non-Parametric Approaches.- Towards efficient and scalable data-intensive content delivery: State-of-the-art, issues and challenges.- Big Data in 5G Distributed Applications.- Big Data Processing, Analysis and Applications in Mobile Cellular Networks.- Medical Data Processing and Analysis for Remote Health and Activities Monitoring.- Towards human cell simulation.- Cloud-based High Throughput Virtual Screening in Novel Drug Discovery.- Ultra Wide Band Body Area Networks: Design and integration with Computational Clouds.- Survey on AI-based multimodal methods for emotion detection.- Forecasting Cryptocurrency Value by Sentiment Analysis: An HPC-oriented Survey of the State-of-the-Art in the Cloud Era.

    1 in stock

    £40.49

  • Game Theory for Networks: 8th International EAI Conference, GameNets 2019, Paris, France, April 25–26, 2019, Proceedings

    Springer Nature Switzerland AG Game Theory for Networks: 8th International EAI Conference, GameNets 2019, Paris, France, April 25–26, 2019, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 8th EAI International Conference on Game Theory for Networks, GameNets 2019, held in Paris, France, in April 2019. The 8 full and 3 short papers presented were carefully reviewed and selected from 17 submissions. They are organized in the following topical sections: Game Theory for Wireless Networks; Games for Economy and Resource Allocation; and Game Theory for Social Networks.Table of ContentsGame Theory for Wireless Networks.- Games for Economy and Resource Allocation.- Game Theory for Social Networks.

    1 in stock

    £34.19

  • Industrial Control Systems Security and

    Springer Nature Switzerland AG Industrial Control Systems Security and

    2 in stock

    Book SynopsisThis book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.Table of Contents1. Current and New Practice.- 2. Cyber-Modeling, Detection, and Forensics.- 3. Proactive Defense Mechanism Design.- 4. Human System Interface.- 5. Metrics For Resilience.

    2 in stock

    £107.99

  • Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings

    Springer Nature Switzerland AG Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.Table of ContentsDependable Systems.- Hardware/Software Co-designed Security Extensions for Embedded Devices.- SDES - Scalable Software Support for Dependable Embedded Systems.- Real-Time Systems.- Asynchronous Critical Sections in Real-Time Multiprocessor Systems.- Resource-Aware Parameter Tuning for Real-Time Applications.- A Hybrid NoC Enabling Fail-Operational and Hard Real-Time Communication in MPSoC.- Special Applications.- DSL-based Acceleration of Automotive Environment Perception and Mapping Algorithms for embedded CPUs, GPUs, and FPGAs.- Applying the Concept of Artificial DNA and Hormone System to a Low-Performance Automotive Environment.- A Parallel Adaptive Swarm Search Framework for Solving Black-Box Optimization Problems.- Architecture.- Leros: the Return of the Accumulator Machine.- A Generic Functional Simulation of Heterogeneous Systems.- Evaluating Dynamic Task Scheduling in a Task-based Runtime System for Heterogeneous Architectures.- Dynamic Scheduling of Pipelined Functional Units in Coarse-Grained Reconfigurable Array Elements.- Memory Hierarchy.- CyPhOS { A Component-based Cache-Aware Multi-Core Operating System.- Investigation of L2-Cache interferences in a NXP QorIQ T4240 multicore processor.- MEMPower: Data-Aware GPU Memory Power Model.- FPGA.- Effective FPGA Architecture for General CRC.- Receive-Side Notification for Enhanced RDMA in FPGA Based Networks.- An Efficient FPGA Accelerator Design for Optimized CNNs using OpenCL.- Energy Awareness.- The Return of Power Gating: Smart Leakage Energy Reductions in Modern Out-of-Order Processor Architectures.- A Heterogeneous and Reconfigurable Embedded Architecture for Energy-efficient Execution of Convolutional Neural Networks.- An energy efficient embedded processor for hard real-time Java applications.- NoC/SoC.- A Minimal Network Interface for a Simple Network-on-Chip.- Network Coding in Networks-on-Chip with Lossy Links.- Application Specific Reconfigurable SoC Interconnection Network Architectures.

    1 in stock

    £49.49

  • Smart Assisted Living: Toward An Open Smart-Home Infrastructure

    Springer Nature Switzerland AG Smart Assisted Living: Toward An Open Smart-Home Infrastructure

    1 in stock

    Book SynopsisSmart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure.This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems.This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.Table of ContentsPart I: Sensing and Activity Monitoring Multi-Resident Activity Monitoring in Smart Homes Through Non-Wearable Non-Intrusive SensorsSon N. Tran and Qing Zhang and Vanessa Smallbon and Mohan Karunanithi Where Am I? Comparing CNN and LSTM for Location Classification in Egocentric VideosGeorgios Kapidis, Ronald W. Poppe, Elsbeth A. van Dam, Remco C. Veltkamp, and Lucas P. J. J. Noldus A Privacy-Preserving Wearable Camera Setup for Dietary Event Spotting in Free-LivingGiovanni Schiboni, Fabio Wasner, and Oliver AmftSaving Energy on EMG-Monitoring Eyeglasses for Free-Living Eating Event Spotting Using Adaptive Duty-CyclingGiovanni Schiboni and Oliver Amft Indoor Localisation with WiFi Fingerprinting Based on a Convolutional Neural NetworkZumin Wang Unobtrusive Sensing to Assist with Post-Stroke RehabilitationChris Nugent Part II: Activity Recognition and Behaviour Analysis Energy-Based Decision Engine for Household Human Activity RecognitionAnastasios Vafeiadis, Thanasis Vafeiadis, Stelios Zikos, Stelios Krinidis, Konstantinos Votis, Dimitrios Giakoumis, Dimosthenis Ioannidis, Dimitrios Tzovaras, Liming Chen, and Raouf Hamzaoui Distributed Context Recognition, a Systematic ReviewUmar Ahmad and Luis Lopera Exercise Type Recognition Using Transfer LearningHossein Malekmohamadi Meta-Intelligence for Behaviour RecognitionXiaodong Liu and Qi Liu Part III: User Needs and Personalisation A Conceptual Framework for Adaptive User Interfaces for Older AdultsEduardo Machado, Deepika Singhy, Federico Cruciani, Liming Chen, Sten Hankey, Fernando Salvago, Johannes Kropf, and Andreas HolzingerStudying the Technological Barriers and Needs of People with Dementia: A Quantitative StudyNikolaos Liappas, Rebeca Isabel García-Betances, José Gabriel Teriús-Padrón, and María Fernanda Cabrera-Umpiérrez Adaptive Service Robot Behaviours Based on User Mood: Towards Better Personalized Support of MCI Patients at HomeDimitrios Giakoumis, Georgia Peleka, Manolis Vasileiadis, Ioannis Kostavelis, and Dimitrios Tzovaras Part IV: Ambient Assisted Living Solutions Towards Cognitive Assisted LivingClaudia Steinberger and Judith Michael Towards Self-Management of Chronic Diseases in Smart HomesJosé G. Teriús-Padrón, Georgios Kapidis, Sarah Fallmann, Erinc Merdivan, Sten Hanke, Rebeca I. García-Betances, and María Fernanda Cabrera-UmpiérrezA Deep Learning Approach for Privacy Preservation in Assisted LivingIsmini Psychoula, Erinc Merdivany, Deepika Singhy, Liming Chen, Feng Chen, Sten Hankey, Johannes Kropfy, Andreas Holzingerx, and Matthieu GeistTowards Socially Assistive Robots for the Elderly: An End-to-End Object Search FrameworkMohammad Reza Loghmani, Timothy Patten and Markus VinczeModelling Activities of Daily Living with Petri NetsMatias Garcia-Constantino, Alexandros Konios and Chris Nugent Calculus of Context-Aware Ambients for Assisted Living System ModellingFrancois Siewe

    1 in stock

    £71.99

  • Getting Started with Enterprise Internet of

    Springer Nature Switzerland AG Getting Started with Enterprise Internet of

    1 in stock

    Book SynopsisThis novel textbook introduces Enterprise Internet of Things from technology, management and business perspectives, carefully examining enterprise environments through the lens of modernization with the Internet of Things (IoT). It also includes detailed case studies to offer meaningful insights for readers from various disciplines and areas. The book analyzes the ways in which the technology could contribute to the enterprise world in terms of revenue and new business models, and addresses the strategies and principles involved in developing IoT solutions with software engineering practices such as DevOps and Micro services architecture principles. By doing so, it offers readers a clear overview of the power of Internet of Things in building next generation enterprise use cases. The book enables readers to understand the latest opportunities to create new business models in enterprises using the unprecedented level of device connectivity, and the wealth of data generated and information exchange among these devices. As such, it appeals to various user groups, such as engineers trying to solve problems in their own domains using Enterprise IoT, academics interested in gaining a better understanding of applications of IoT in large-scale enterprises, and researchers wanting to contribute to the ever-growing and complex area of IoT.Table of Contents

    1 in stock

    £67.49

  • Computer Networks and the Internet: A Hands-On Approach

    Springer Nature Switzerland AG Computer Networks and the Internet: A Hands-On Approach

    1 in stock

    Book SynopsisThe goal of this textbook is to provide enough background into the inner workings of the Internet to allow a novice to understand how the various protocols on the Internet work together to accomplish simple tasks, such as a search. By building an Internet with all the various services a person uses every day, one will gain an appreciation not only of the work that goes on unseen, but also of the choices made by designers to make life easier for the user.Each chapter consists of background information on a specific topic or Internet service, and where appropriate a final section on how to configure a Raspberry Pi to provide that service.While mainly meant as an undergraduate textbook for a course on networking or Internet protocols and services, it can also be used by anyone interested in the Internet as a step–by–step guide to building one's own Intranet, or as a reference guide as to how things work on the global Internet Trade Review“The detailed coverage of networking topics together with practical hands-on illustrations of the principles using the Raspberry Pi laboratory network make this an excellent candidate for a course textbook. In addition, the detailed table of contents, good index, and extensive list of references also make it useful for reference … . If you want just one book in your technical library to cover the Internet and networking technology, then this is an ideal candidate.” (David B. Henderson, Computing Reviews, August 17, 2021)Table of Contents1. Introduction.- 2. The OSI Seven Layer Model.- 3. The Physical Layer, L1.- 4. The Data Layer, L2.- 5. The Network Layer, L3.- 6. The OSI Upper Layers.- 7. Flow Control.- 8. The Laboratory Network.- 9. Raspberry Pi Operating System.- 10. Routing.- 11. The Router.- 12. Populating and Maintaining the Route Table.- 13. Shortest Path Through the Network.- 14. Dynamic Host Configuration.- 15. Routing Protocols.- 16. Route Interchange Protocol.- 17. Open Shortest Path First.- 18. Service Provider Protocols.- 19. Babel.- 20. Domain Name Service.- 21. Hyper Text Transfer Protocol: The Web.- 22. Simple Mail Transfer Protocol: Email.- 23. Other Services.- Glossary.- References.- Index.

    1 in stock

    £44.99

  • Internet Computing: Principles of Distributed

    Springer Nature Switzerland AG Internet Computing: Principles of Distributed

    1 in stock

    Book SynopsisThis book introduces the reader to the fundamentals of contemporary, emerging and future technologies and services in Internet computing. It covers essential concepts such as distributed systems architectures and web technologies, contemporary paradigms such as cloud computing and the Internet of things, and emerging technologies like distributed ledger technologies and fog computing. The book also highlights the interconnection and recombination of these Internet-based technologies, which together form a critical information infrastructure with major impacts on individuals, organizations, governments, economies, and society as a whole.Intended as a textbook for upper undergraduate and graduate classes, it features a wealth of examples, learning goals and summaries for every chapter, numerous recommendations for further reading, and questions for checking students’ comprehension. A dedicated author website offers additional teaching material and more elaborate examples. Accordingly, the book enables students and young professionals in IT-related fields to familiarize themselves with the Internet’s basic mechanisms, and with the most promising Internet-based technologies of our time. Table of Contents1 Introduction to Internet Computing.- 2 Information Systems Architecture.- 3 Design of Good Information Systems Architectures.- 4 Internet Architectures.- 5 Middleware.- 6 Web services.- 7 Cloud Computing.- 8 Fog and Edge Computing.- 9 Distributed Ledger Technology.- 10 The Internet of Things.- 11 Critical Information Infrastructures.- 12 Emerging Technologies.- Glossary.

    1 in stock

    £56.99

  • Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings

    Springer Nature Switzerland AG Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020. The 20 full and 3 short papers presented in this volume were carefully reviewed and selected from 110 submissions. In addition, the book included 6 invited papers. The contributions were organized in topical sections named: invited talks; concurrent and distributed systems modelling and verification; cloud and grid computing; social networks, machine learning and mobile networks; data processing and blockchain technology; and short papers. Table of ContentsInvited Talks.- Graph Analytics.- A distributed and trusted web of formal proofs.- Prosperos Books: A Distributed Architecture for AI.- Trust: Anthropomorphic Algorithmic.- A Very Gentle Introduction to Multiparty Session Types.- Constructing Knowledge Graph from Data Catalogues.- Concurrent and Distributed Systems Modelling and Verification.- Round-Message Trade-off in Distributed Steiner Tree Construction in the CON GEST model.- An Efficient Message Transmission and Verification Scheme for VANETs.- Generalised Dining Philosophers as Feedback Control.- Verifying Implicitly Quantified Modal Logic over dynamic networks of processes.- Cloud and Grid Computing.- Secure Content-based Image Retrieval using Combined Features in Cloud.- Design of a Scheduling Approach for Budget-deadline Constrained Applications in Heterogeneous Clouds.- Resource Scheduling for Tasks of a Workflow in Cloud Environment.- Bearing Fault Classification using Wavelet Energy and Autoencoder.- Social Networks, Machine Learning and Mobile Networks.- Community Detection in Social Networks using Deep Learning.- Multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks.- A Hybrid Approach for Fake News Detection in Twitter based on User Features and Graph Embedding.- Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms.- A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid.- An Online Low-Cost System for Air Quality Monitoring, Prediction, and Warning.-Word2vecs Distributed Word Representation for Hindi Word Sense Disambiguation.- Text Document Clustering using Community Discovery Approach.- Data Processing and Blockchain Technology.- An Efficient and Novel Buyer and Sellers Distributed Ledger Based Protocol Using Smart Contracts.- Distributed and Lazy Auditing of Outsourced Data HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- Transcript Management Using Blockchain enabled Smart Contracts.- Short Papers.- Identifying Reduced Features based on IG-Threshold for DoS Attack Detection using PART.- Uniform Circle Formation by Swarm Robots Under Limited Visibility.- Histopathological Image Classification by Optimized Neural Network using IGSA.

    1 in stock

    £62.99

  • Technology, Innovation, Entrepreneurship and Education: 3rd EAI International Conference, TIE 2019, Braga, Portugal, October 17–18, 2019, Proceedings

    Springer Nature Switzerland AG Technology, Innovation, Entrepreneurship and Education: 3rd EAI International Conference, TIE 2019, Braga, Portugal, October 17–18, 2019, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 3rd International Conference on Technology, Innovation, Entrepreneurship and Education, TIE 2019, held in Braga, Portugal, in October 2019. The 11 full and 2 short papers focus on emerging technologies for education, entertainment, well-being, creativity, arts and business development. In addition, it aims at promoting new venture creation opportunities that emerge from these innovations, as well as innovation methods that target these core subjects.Table of ContentsInnovating and Exploring Children´s Learning.- Reading to Level Up: Gamifying Reading Fluency.- Rethinking the Design of Hotspots in Children’s Digital Picturebooks: Insights from an Exploratory Study.- Children’s tinkering activity with Collapse Informatics: the Internalization of Environmental Consciousness.- ”Play and learn”: exploring CodeCubes Innovating Media Usage.- Question & Answering interface to improve the students’ experience in an e-learning course with a virtual tutor.- Exploring the Use of Augmented Reality Concepts to Enhance the TV Viewer Experience.- Design Experiments in Nonrepresentational VR and Symmetric Texture Generation in Real-Time Innovation for Special Needs.- Didactic toy for children with special needs.- Digitally-mediated Learning Environments and Information Literacy for Active Ageing: A Pilot Study.- European video game development and disability: Reflections on data, rights, decisions and assistance Innovating Methods.- From community datamining to enterprising villagers.- The transformational effect of a designerly approach within a research project.- Visual Quotes and Physical Activity Tracking: Can Aesthetic Pleasure Motivate Our Short-term Exercise Motivation?.- Raising the Odds of Success for Innovative Product by Experimentation and Utilizing Input of Future User.

    1 in stock

    £34.19

  • Linear Algebra and Optimization for Machine

    Springer Nature Switzerland AG Linear Algebra and Optimization for Machine

    15 in stock

    Book SynopsisThis textbook introduces linear algebra and optimization in the context of machine learning. Examples and exercises are provided throughout the book. A solution manual for the exercises at the end of each chapter is available to teaching instructors. This textbook targets graduate level students and professors in computer science, mathematics and data science. Advanced undergraduate students can also use this textbook. The chapters for this textbook are organized as follows:1. Linear algebra and its applications: The chapters focus on the basics of linear algebra together with their common applications to singular value decomposition, matrix factorization, similarity matrices (kernel methods), and graph analysis. Numerous machine learning applications have been used as examples, such as spectral clustering, kernel-based classification, and outlier detection. The tight integration of linear algebra methods with examples from machine learning differentiates this book from generic volumes on linear algebra. The focus is clearly on the most relevant aspects of linear algebra for machine learning and to teach readers how to apply these concepts.2. Optimization and its applications: Much of machine learning is posed as an optimization problem in which we try to maximize the accuracy of regression and classification models. The “parent problem” of optimization-centric machine learning is least-squares regression. Interestingly, this problem arises in both linear algebra and optimization, and is one of the key connecting problems of the two fields. Least-squares regression is also the starting point for support vector machines, logistic regression, and recommender systems. Furthermore, the methods for dimensionality reduction and matrix factorization also require the development of optimization methods. A general view of optimization in computational graphs is discussed together with its applications to back propagation in neural networks. A frequent challenge faced by beginners in machine learning is the extensive background required in linear algebra and optimization. One problem is that the existing linear algebra and optimization courses are not specific to machine learning; therefore, one would typically have to complete more course material than is necessary to pick up machine learning. Furthermore, certain types of ideas and tricks from optimization and linear algebra recur more frequently in machine learning than other application-centric settings. Therefore, there is significant value in developing a view of linear algebra and optimization that is better suited to the specific perspective of machine learning. Trade Review“Based on the topics covered and the excellent presentation, I would recommend Aggarwal's book over these other books for an advanced undergraduate or beginning graduate course on mathematics for data science.” (Brian Borchers, MAA Reviews, March 28, 2021)“This book should be of interest to graduate students in engineering, applied mathematics, and other fields requiring an understanding of the mathematical underpinnings of machine learning.” (IEEE Control Systems Magazine, Vol. 40 (6), December, 2020)Table of ContentsPreface.- 1 Linear Algebra and Optimization: An Introduction.- 2 Linear Transformations and Linear Systems.- 3 Eigenvectors and Diagonalizable Matrices.- 4 Optimization Basics: A Machine Learning View.- 5 Advanced Optimization Solutions.- 6 Constrained Optimization and Duality.- 7 Singular Value Decomposition.- 8 Matrix Factorization.- 9 The Linear Algebra of Similarity.- 10 The Linear Algebra of Graphs.- 11 Optimization in Computational Graphs.- Index.

    15 in stock

    £42.74

  • Artificial Intelligence in Economics and Finance

    Springer Nature Switzerland AG Artificial Intelligence in Economics and Finance

    1 in stock

    Book SynopsisAs Artificial Intelligence (AI) seizes all aspects of human life, there is a fundamental shift in the way in which humans are thinking of and doing things. Ordinarily, humans have relied on economics and finance theories to make sense of, and predict concepts such as comparative advantage, long run economic growth, lack or distortion of information and failures, role of labour as a factor of production and the decision making process for the purpose of allocating resources among other theories. Of interest though is that literature has not attempted to utilize these advances in technology in order to modernize economic and finance theories that are fundamental in the decision making process for the purpose of allocating scarce resources among other things. With the simulated intelligence in machines, which allows machines to act like humans and to some extent even anticipate events better than humans, thanks to their ability to handle massive data sets, this book will use artificial intelligence to explain what these economic and finance theories mean in the context of the agent wanting to make a decision. The main feature of finance and economic theories is that they try to eliminate the effects of uncertainties by attempting to bring the future to the present. The fundamentals of this statement is deeply rooted in risk and risk management. In behavioural sciences, economics as a discipline has always provided a well-established foundation for understanding uncertainties and what this means for decision making. Finance and economics have done this through different models which attempt to predict the future. On its part, risk management attempts to hedge or mitigate these uncertainties in order for “the planner” to reach the favourable outcome. This book focuses on how AI is to redefine certain important economic and financial theories that are specifically used for the purpose of eliminating uncertainties so as to allow agents to make informed decisions. In effect, certain aspects of finance and economic theories cannot be understood in their entirety without the incorporation of AI.Table of ContentsIntroduction to Artificial Intelligence in Economics and Finance Theories.- The Growth Model.- Comparative Advantage.- The Dual-Sector Model.- Dynamic Inconsistency Theory.- The Philipps Curve.- The Laffer Curve.- Adverse Selection.- Moral Hazard.- Creative Destruction.- The Agency Theory.- The Legitimacy Theory and the Legitimacy Gap.- Synopsis: Artificial Intelligence in Finance and Economics Theories.- Index

    1 in stock

    £116.99

  • Statistical Analysis of Network Data with R

    Springer Nature Switzerland AG Statistical Analysis of Network Data with R

    1 in stock

    Book SynopsisThe new edition of this book provides an easily accessible introduction to the statistical analysis of network data using R. It has been fully revised and can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. The new edition of this book includes an overhaul to recent changes in igraph. The material in this book is organized to flow from descriptive statistical methods to topics centered on modeling and inference with networks, with the latter separated into two sub-areas, corresponding first to the modeling and inference of networks themselves, and then, to processes on networks. The book begins by covering tools for the manipulation of network data. Next, it addresses visualization and characterization of networks. The book then examines mathematical and statistical network modeling. This is followed by a special case of network modeling wherein the network topology must be inferred. Network processes, both static and dynamic are addressed in the subsequent chapters. The book concludes by featuring chapters on network flows, dynamic networks, and networked experiments. Statistical Analysis of Network Data with R, 2nd Ed. has been written at a level aimed at graduate students and researchers in quantitative disciplines engaged in the statistical analysis of network data, although advanced undergraduates already comfortable with R should find the book fairly accessible as well.Table of Contents1 Introduction.- 2 Manipulating Network Data.- 3 Visualizing Network Data.- 4 Descriptive Analysis of Network Graph Characteristics.- 5 Mathematical Models for Network Graphs.- 6 Statistical Models for Network Graphs.- 7 Network Topology Inference.- 8 Modeling and Prediction for Processes on Network Graphs.- 9 Analysis of Network Flow Data.- 10 Networked Experiments.- 11 Dynamic Networks.- Index.

    1 in stock

    £56.99

  • Blockchain and Distributed Ledger Technology Use

    Springer Nature Switzerland AG Blockchain and Distributed Ledger Technology Use

    15 in stock

    Book SynopsisBlockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications.Table of ContentsToward More Rigorous Blockchain Research: Recommendations for Writing Blockchain Case Studies.- From a Use Case Categorization Scheme Towards A Maturity Model for Engineering Distributed Ledgers.- What’s In The Box? Combating Counterfeit Medications in Pharmaceutical Supply Chains With Blockchain Vigilant Information Systems.- A Use Case of Blockchain in Healthcare: Allergy Card.- International Exchange Of Financial Information on Distributed Ledgers: Outlook and Design Blueprint.- A Blockchain Supported Solution for Compliant Digital Security Offerings.- A Blockchain-Driven Approach to Fulfill the GDPR Recording Requirements.- Wibson: A Case Study of a Decentralized, Privacy-Preserving Data Marketplace.- : Business Process Transformation in Natural Resources Development Using Blockchain: Indigenous Entrepreneurship, Trustless Technology, and Rebuilding Trust.- Smart City Applications on the Blockchain: Development of a Multi-Layer Taxonomy.- A Case Study of Blockchain-Induced Digital Transformation in the Public Sector.- Analyzing the Potential of DLT-Based Applications in Smart Factories.- Disrupting Platform Organizations with Blockchain Technology and the Internet of Things?.- Using Blockchain for Online Multimedia Management: Characteristics of Existing Platforms.- Supply Chain Visibility Ledger.

    15 in stock

    £151.99

  • Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405

    Springer Nature Switzerland AG Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405

    1 in stock

    Book SynopsisThis open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019.Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first. Table of ContentsFoundations of Reversible Computation.- Software and Reversible Systems: A Survey of Recent Activities.- Simulation and Design of Quantum Circuits.- Research on Reversible Functions Having Component Functions with Specified Properties - An Overview.- A Case Study for Reversible Computing: Reversible Debugging.- Towards Choreographic-Based Monitoring.- Reversibility in Chemical Reactions.- Reversible Control of Robots.- Reversible Languages and Incremental State Saving in Optimistic Parallel Discrete Event Simulation.- Reversible Computation in Wireless Communications.- Error Reconciliation in Quantum Key Distribution Protocols.

    1 in stock

    £31.49

  • Web Engineering: 20th International Conference, ICWE 2020, Helsinki, Finland, June 9–12, 2020, Proceedings

    Springer Nature Switzerland AG Web Engineering: 20th International Conference, ICWE 2020, Helsinki, Finland, June 9–12, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Web Engineering, ICWE 2020, which was planned to take place in Helsinki, Finland, during June 9-12, 2020. Due to the corona pandemic the conference changed to a virtual format. The total of 24 full and 10 short contributions presented in this volume were carefully reviewed and selected from 78 submissions. The book also contains 4 PhD and 7 demo papers. The papers were organized in topical sections named: User interface technologies; performance of Web technologies; machine learning; testing of Web applications; emotion detection; location-aware applications; sentiment analysis; open data; liquid Web applications; Web-based learning; PhD symposium; demos and posters.Table of ContentsUser Interface Technologies.- Detecting Responsive Design Bugs with Declarative Speci cations.- Layout as a Service (LaaS): A Service Platform for Self-Optimizing Web Layouts.- Structural Pro ling of Web Sites in the Wild.- Performance of Web Technologies.- Accelerating Web Start-up with Resource Preloading.- An Analysis of Throughput and Latency Behaviours under Microservice Decomposition.- W-ADE: Timing Performance Prediction in Web of Things.- Comparing a polling and push-based approach for live Open Data interfaces.- NuMessage: Providing Scalable and Reliable Messaging Service in Distributed Systems.- Machine Learning.- A Credit Scoring Model for SMEs Based on Social Media Data.- Who's Behind That Website? Classifying Websites by the Degree of Commercial Intent.- I Don't Have That Much Data! Reusing User Behavior Models for Websites from Different Domains.- Improving Detection Accuracy For Malicious JavaScript Using GAN.- VISH: Does Your Smart Home Dialogue System Also Need Training Data.- Neighborhood Aggregation Embedding Model for Link Prediction in Knowledge Graphs.- Testing of Web Applications.- Automatic Model Completion for Web Applications.- Almost Rerere: an approach for automating con ict resolution from similar resolved conflicts.- Generation of Realistic Navigation Paths for Web Site Testing using Recurrent Neural Networks and Generative Adversarial Neural Networks.- Emotion Detection.- Scalable Real-time Emotion Detection for Personalized Onboarding Guides.- Creating and Capturing Arti cial Emotions in Autonomous Robots and Software Agents.- On Emotions in Con ict Wikipedia Talk Pages Discussions.- Location-aware Applications.- Geospatial partitioning of open transit data.- Efficient Live Public Transport Data Sharing for Route Planning on the Web.- Web-Based Development and Visualization Dashboards for Smart City Applications.- Sentiment Analysis.- Detecting Rumor on Microblogging Platforms via a Heterogeneous Stance Attention Mechanism.- A Hybrid Approach for Aspect-Based Sentiment Analysis Using Deep Contextual Word Embeddings and Hierarchical Attention.- Just the Right Mood for HIT! Analyzing the Role of Worker Moods in Conversational Microtask Crowdsourcing.- Open Data.- SolidRDP: Applying Solid Data Containers for Research Data Publishing.- Applying Natural Language Processing Techniques to Generate Open Data Web APIs Documentation.- Liquid Web Applications.- WebDelta: Lightweight Migration of Web Applications with Modified Execution State.- User-side service synchronization in multiple devices environment.- An approach to build P2P Web Extensions.- Web-based Learning.- Blended or Distance Learning? Comparing Student Performance between University and Open University.- Teaching Web Stream Processing: Lessons Learned.- Teaching Container-based DevOps Practices.- PhD Symposium.- Predicting the outbreak of con ict in online discussions using emotion-based features.- An APIfication Approach to Facilitate the Access and Reuse of Open Data.- A Personal Health Trajectory API: addressing problems in health institution-oriented systems.- Context-Aware Encoding & Delivery in the Web.- Demos and posters.- An OpenAPI-based Testing Framework to Monitor Non-Functional Properties of REST APIs.- OpenAPI Bot: A Chatbot to Help You Understand REST APIs.- A different Web Analytics Perspective through Copy to Clipboard Heatmaps.- A Web Augmentation Framework for Accessibility based on Voice Interaction.- Annotated knowledge graphs for teaching in Higher Education: Supporting mentors and mentees by digital systems.- A Universal Application Programming Interface to access and reuse Linked Open Data.- OntoSemStats: an ontology to express the use of semantics in RDF-based knowledge graphs.

    1 in stock

    £62.99

  • Blended Learning. Education in a Smart Learning Environment: 13th International Conference, ICBL 2020, Bangkok, Thailand, August 24–27, 2020, Proceedings

    Springer Nature Switzerland AG Blended Learning. Education in a Smart Learning Environment: 13th International Conference, ICBL 2020, Bangkok, Thailand, August 24–27, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 13th International Conference on Blended Learning, ICBL 2020, held in Bangkok, in August 2020.The 33 papers presented were carefully reviewed and selected from 70 submissions. The conference theme of ICBL 2020 is Blended Learning : Education in a Smart Learning Environment. The papers are organized in topical sections named: Blended Learning, Hybrid Learning, Online Learning, Enriched and Smart Learning, Learning Management System and Content and Instructional Design. Table of Contents

    1 in stock

    £62.99

  • IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning: Second International Workshop, IoT Streams 2020, and First International Workshop, ITEM 2020, Co-located with ECML/PKDD 2020, Ghent,

    Springer Nature Switzerland AG IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning: Second International Workshop, IoT Streams 2020, and First International Workshop, ITEM 2020, Co-located with ECML/PKDD 2020, Ghent,

    1 in stock

    Book SynopsisThis book constitutes selected papers from the Second International Workshop on IoT Streams for Data-Driven Predictive Maintenance, IoT Streams 2020, and First International Workshop on IoT, Edge, and Mobile for Embedded Machine Learning, ITEM 2020, co-located with ECML/PKDD 2020 and held in September 2020. Due to the COVID-19 pandemic the workshops were held online. The 21 full papers and 3 short papers presented in this volume were thoroughly reviewed and selected from 35 submissions and are organized according to the workshops and their topics: IoT Streams 2020: Stream Learning; Feature Learning; ITEM 2020: Unsupervised Machine Learning; Hardware; Methods; Quantization.Table of ContentsStream Learning.- Feature Learning.- Unsupervised Machine Learning.- Hardware.- Methods.- Quantization.

    1 in stock

    £67.49

  • Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18,  2020, Revised Selected Papers

    Springer Nature Switzerland AG Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis.The book contains 6 chapters which are available open access under a CC-BY license. Table of ContentsSecurity Threat Intelligence.- Privacy-Preserving CCTV Analytics for Cyber-Physical Threat Intelligence.- TLSAssistant goes FINSEC: A Security Platform Integration Extending Threat Intelligence Language.- Cyber Threat Monitoring Systems - Comparing attack detection performance of ensemble algorithms.- FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures.- Data Anomaly Detection: Predict & Prevent.- Inferring anomaly situation from multiple data sources in CyberPhysical Systems.- Fusing RGB and Thermal Imagery with Channel State Information for Abnormal Activity Detection using Multimodal Bidirectional LSTM.- A Cloud-Based Anomaly Detection for IoT Big Data.- Computer Vision & Dataset for Security.- An advanced Framework for Critical Infrastructure Protection using computer vision technologies.- A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning based CPS Security Research.- Security Management & Governance.- Cross-Domain Security Asset Management for Healthcare.- Towards a global CIs' cyber-physical security management and joint coordination approach.- Toward a Context-Aware Methodology for Information Security Governance Assessment Validation.- Impact Propagation & Power Traffic Analysis.- Impact Propagation in Airport Systems.- A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks.

    1 in stock

    £31.49

  • Simulation Gaming Through Times and Disciplines: 50th International Simulation and Gaming Association Conference, ISAGA 2019, Warsaw, Poland, August 26–30, 2019, Revised Selected Papers

    Springer Nature Switzerland AG Simulation Gaming Through Times and Disciplines: 50th International Simulation and Gaming Association Conference, ISAGA 2019, Warsaw, Poland, August 26–30, 2019, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes revised selected papers from the 50th International Simulation and Gaming Association Conference, ISAGA 2019, which took place in Warsaw, Poland, during August 26–30, 2019.The 38 papers presented in this volume were carefully reviewed and selected from 72 submissions. They were organized in topical sections named: simulation gaming in the science space; simulation gaming design and implementation; simulation games for current challenges; simulation games and gamification; and board perspective on simulation gaming.Table of ContentsSimulation gaming in the science space.- A Journey to the Role of Facilitator: Personal stories unfolding alongside world trends.- Differences between Facilitator-guided and Self-guided Debriefing on the Attitudes of University Students.- Evaluation of a pilot game to change civil servants’ willingness towards open data policy making.- Structuring game design with active learning benefits: insights from logistical skills training in managing an emergency department.- Playing (in) a Crisis Simulation: What is the playful engagement in a serious simulation made of.- Through a Mirror Darkly – On the Obscurity of Teaching Goals in Game-Based Learning in IT Security.- The Tacit Knowledge in Games: From Validation to Debriefing.- Educational Escape Room – Challenges and Obstacles.-Simulation gaming design and implementation.- Simulated Construction of State`s Intersubjective Reality in Virtual Games: An Emerging Tool of Social Power.- A Review of Game-Based Research for English Language Learning in S&G Interdiscipline Journal.- Accuracy in Business Simulations.- Group-based learning and group composition on the provision of public goods: Incorporating agent-based simulation and gaming.- Can the Veil of Ignorance Create Consensus? A Qualitative Analysis Using the Siting for a Contaminated Waste Landfill Game.- The Development of the 3D Role-Playing Game on PC with an Assistive System for Deuteranopia.- The Trust Game: The influence of Trust on: Collaboration in the light of Technological Innovations.- The funnel of game design - Proposing a new way to address a problem definition using the IDEAS approach.- Little Things Mean a Lot in Simulations.- Impact of Competition in Energy Market on Promotion of Renewables: an Agent-Based Model Approach.- The perception of business wargaming practices among strategic and competitive intelligence professionals.- Managing Competing Values in Sustainable Urban Tourism: a Simulation-Gaming Approach.- Simulation games as a framework to conduct scientific experiments – the example of prospect theory research.- Study on occurrence mechanism of quality scandal in enterprises by ”Sontaku”, ”air” and ”water” theory using business game.- Interpersonal Competitiveness in a Cohesive Team: Insights from a Business Simulation Game.- Simulation games for current challenges.- Review of Haptic and Computerized (Simulation) Games on Climate Change.- Food-web modeling in the Maritime Spatial Planning Challenge Simulation Platform: Results from the Baltic Sea Region.- Unpacking, Overconfidence, and Game Design.- Authentic Learning in Entrepreneurship Education.- Learning from a Business Simulation Game: A Factor-Analytic Study.- Gamification and gaming cultures.- Resolving Migrant Issues in Thailand Using the Framework of ‘Simulation Game – Project PAL’.- Gamification Design Strategies - summary of research project.- Fostering Adaptive Organizations: Some Practical Lessons From Space Pirates.- Comparison of Experience of Using Business Games in University of Lodz and Kaunas University of Technology.- Board perspective on simulation gaming.- Video game monetization mechanisms in triple A (AAA) video games.- Learning with Location-Based Gaming.- Methodological challenges of creating a next-generation machine learning-based game engine for generating maps and vehicle behavior.- Agent-based Simulation for Sustainable Management of Supply Chain and Natural Resources: Basic Model.- Wonders of the World Simulation Program by Virtual Reality.- Framework and application of live video streaming as a virtual reality gaming technology: a study of function and performance.

    1 in stock

    £67.49

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account