Computing & Information Technology Books

Sidebar Sidebar Sidebar
  • Global Public Health Vigilance Global Public Health Vigilance
    Add to Cart The item has been added

    Global Public Health Vigilance

    Global Public Health Vigilance is the first sociological book to investigate recent changes in how global public health authorities imagine and respond to international threats to human health. This book explores a remarkable period of conceptual...
    $122.68

    Add to Cart The item has been added
  • Cloud VR Cloud VR
    Add to Cart The item has been added

    Cloud VR

    Based on the technical accumulation and practice of Huawei iLab in the Cloud VR field, this book systematically describes the advantages of Cloud VR technologies; technical requirements on clouds, networks, and terminals as well as solution...
    $119.12

    Add to Cart The item has been added
  • Disorder and the Disinformation Society Disorder and the Disinformation Society
    Add to Cart The item has been added

    Disorder and the Disinformation Society

    This book is the first general social analysis that seriously considers the daily experience of information disruption and software failure within contemporary Western society. Through an investigation of informationalism, defined as a contemporary form...
    $111.59

    Add to Cart The item has been added
  • Psychoanalysis and Digital Culture Psychoanalysis and Digital Culture
    Add to Cart The item has been added

    Psychoanalysis and Digital Culture

    Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the...
    $114.10

    Add to Cart The item has been added
  • Rethinking IT in Construction and Engineering Rethinking IT in Construction and Engineering
    Add to Cart The item has been added

    Rethinking IT in Construction and Engineering

    How could the potential of IT be realised to improve business performance in architecture, construction and engineering organisations? How could organisations unleash the potential of IT to achieve a sustainable competitive advantage? How can...
    $126.65

    Add to Cart The item has been added
  • Mobile Evolution Mobile Evolution
    Add to Cart The item has been added

    Mobile Evolution

    This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary...
    $119.12

    Add to Cart The item has been added
  • Just Ordinary Robots Just Ordinary Robots
    Add to Cart The item has been added

    Just Ordinary Robots

    A social robot is a robot that interacts and communicates with humans or other autonomous physical agents by following social behaviors and rules attached to its role. We seem to accept the use of robots that perform dull, dirty, and dangerous jobs. But...
    $119.12

    Add to Cart The item has been added
  • Wireless Sensor Multimedia Networks Wireless Sensor Multimedia Networks
    Add to Cart The item has been added

    Wireless Sensor Multimedia Networks

    Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass data such as temperature, pressure, and humidity through the network to a central location. Wireless sensor multimedia networks...
    $119.12

    Add to Cart The item has been added
  • Smart Autonomous Aircraft Smart Autonomous Aircraft
    Add to Cart The item has been added

    Smart Autonomous Aircraft

    With the extraordinary growth of Unmanned Aerial Vehicles (UAV) in research, military, and commercial contexts, there has been a need for a reference that provides a comprehensive look at the latest research in the area. Filling this void, Smart...
    $131.67

    Add to Cart The item has been added
  • Security and Privacy in Internet of Things (IoTs) Security and Privacy in Internet of Things (IoTs)
    Add to Cart The item has been added

    Security and Privacy in Internet of Things (IoTs)

    The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings...
    $119.12

    Add to Cart The item has been added
  • Handbook on Session Initiation Protocol Handbook on Session Initiation Protocol
    Add to Cart The item has been added

    Handbook on Session Initiation Protocol

    Session Initiation Protocol (SIP), standardized by the Internet Engineering Task Force (IETF), has emulated the simplicity of the protocol architecture of hypertext transfer protocol (HTTP) and is being popularized for VoIP over the Internet because of...
    $119.12

    Add to Cart The item has been added
  • A Practical Introduction to Supply Chain A Practical Introduction to Supply Chain
    Add to Cart The item has been added

    A Practical Introduction to Supply Chain

    In many businesses, supply chain people are trapped in reactive roles where they source, contract, purchase, receive, warehouse, and ship as a service. However, in some businesses suppliers contribute to improvement programs, technology, funding,...
    $119.12

    Add to Cart The item has been added
  • Introduction to Radio Engineering Introduction to Radio Engineering
    Add to Cart The item has been added

    Introduction to Radio Engineering

    The book introduces the basic foundations of high mathematics and vector algebra. Then, it explains the basic aspects of classical electrodynamics and electromagnetism. Based on such knowledge readers investigate various radio propagation problems...
    $119.12

    Add to Cart The item has been added
  • Location Privacy in Wireless Sensor Networks Location Privacy in Wireless Sensor Networks
    Add to Cart The item has been added

    Location Privacy in Wireless Sensor Networks

    Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop...
    $119.12

    Add to Cart The item has been added
  • Learning with Uncertainty Learning with Uncertainty
    Add to Cart The item has been added

    Learning with Uncertainty

    Learning with uncertainty covers a broad range of scenarios in machine learning, this book mainly focuses on: (1) Decision tree learning with uncertainty, (2) Clustering under uncertainty environment, (3) Active learning based on uncertainty criterion,...
    $119.12

    Add to Cart The item has been added
  • Bioinformatics Database Systems Bioinformatics Database Systems
    Add to Cart The item has been added

    Bioinformatics Database Systems

    Modern biological databases comprise not only data, but also sophisticated query facilities and bioinformatics data analysis tools. This book provides an exploration through the world of Bioinformatics Database Systems.The book summarizes the popular and...
    $119.12

    Add to Cart The item has been added
  • Advanced Design and Implementation of Virtual Machines Advanced Design and Implementation of Virtual Machines
    Add to Cart The item has been added

    Advanced Design and Implementation of Virtual Machines

    Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java...
    $119.12

    Add to Cart The item has been added
  • Artificial Intelligence with Uncertainty Artificial Intelligence with Uncertainty
    Add to Cart The item has been added

    Artificial Intelligence with Uncertainty

    This book develops a framework that shows how uncertainty in Artificial Intelligence (AI) expands and generalizes traditional AI. It explores the uncertainties of knowledge and intelligence. The authors focus on the importance of natural language –...
    $119.12

    Add to Cart The item has been added
  • ARM Microprocessor Systems ARM Microprocessor Systems
    Add to Cart The item has been added

    ARM Microprocessor Systems

    This book presents the use of a microprocessor-based digital system in our daily life. Its bottom-up approach ensures that all the basic building blocks are covered before the development of a real-life system. The ultimate goal of the book is to equip...
    $114.10

    Add to Cart The item has been added
  • Opportunistic Networking Opportunistic Networking
    Add to Cart The item has been added

    Opportunistic Networking

    Opportunistic networking, by definition, allows devices to communicate whenever a window of opportunity is available. Many emerging technologies employ opportunistic exchanges of information. This book addresses this trend in communications engineering,...
    $119.12

    Add to Cart The item has been added
  • Device-to-Device based Proximity Service Device-to-Device based Proximity Service
    Add to Cart The item has been added

    Device-to-Device based Proximity Service

    D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest...
    $119.12

    Add to Cart The item has been added
  • Managing the PSTN Transformation Managing the PSTN Transformation
    Add to Cart The item has been added

    Managing the PSTN Transformation

    While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the...
    $119.12

    Add to Cart The item has been added
  • Generalized Sylvester Equations Generalized Sylvester Equations
    Add to Cart The item has been added

    Generalized Sylvester Equations

    Provides One Unified Formula That Gives Solutions to Several Types of GSEsGeneralized Sylvester equations (GSEs) are applied in many fields, including applied mathematics, systems and control, and signal processing. Generalized Sylvester Equations:...
    $124.13

    Add to Cart The item has been added
  • Introduction to Communications Technologies Introduction to Communications Technologies
    Add to Cart The item has been added

    Introduction to Communications Technologies

    Thanks to the advancement of faster processors within communication devices, there has been a rapid change in how information is modulated, multiplexed, managed, and moved. While formulas and functions are critical in creating the granular components and...
    $126.65

    Add to Cart The item has been added
  • Securing Cyber-Physical Systems Securing Cyber-Physical Systems
    Add to Cart The item has been added

    Securing Cyber-Physical Systems

    Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems...
    $119.12

    Add to Cart The item has been added
  • Computer Network Simulation Using NS2 Computer Network Simulation Using NS2
    Add to Cart The item has been added

    Computer Network Simulation Using NS2

    Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge and skills, covering everything from simple operating system commands to the analysis of complex network performance metrics.The book begins with a...
    $129.16

    Add to Cart The item has been added
  • Introduction to Certificateless Cryptography Introduction to Certificateless Cryptography
    Add to Cart The item has been added

    Introduction to Certificateless Cryptography

    As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete...
    $119.12

    Add to Cart The item has been added
  • New Directions in Behavioral Biometrics New Directions in Behavioral Biometrics
    Add to Cart The item has been added

    New Directions in Behavioral Biometrics

    Automatic biometrics recognition techniques are increasingly important in corporate and public security systems and have increased in methods due to rapid field development. This book discusses classic behavioral biometrics as well as collects the latest...
    $119.12

    Add to Cart The item has been added
  • Shaping the Future of ICT Shaping the Future of ICT
    Add to Cart The item has been added

    Shaping the Future of ICT

    The International Conference on Communications, Management, and Information Technology (ICCMIT'16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory,...
    $119.12

    Add to Cart The item has been added
  • Stochastic H2/H ∞ Control Stochastic H2/H ∞ Control
    Add to Cart The item has been added

    Stochastic H2/H ∞ Control

    The H∞ control has been one of the important robust control approaches since the 1980s. This book extends the area to nonlinear stochastic H2/H∞ control, and studies more complex and practically useful mixed H2/H∞ controller synthesis rather than the...
    $124.13

    Add to Cart The item has been added
  • Energy-Efficient Wireless Sensor Networks Energy-Efficient Wireless Sensor Networks
    Add to Cart The item has been added

    Energy-Efficient Wireless Sensor Networks

    The advances in low-power electronic devices integrated with wireless communication capabilities are one of recent areas of research in the field of Wireless Sensor Networks (WSNs). One of the major challenges in WSNs is uniform and least energy...
    $119.12

    Add to Cart The item has been added
  • Social Networks with Rich Edge Semantics Social Networks with Rich Edge Semantics
    Add to Cart The item has been added

    Social Networks with Rich Edge Semantics

    Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in...
    $124.13

    Add to Cart The item has been added
  • Intrusion Detection and Prevention for Mobile Ecosystems Intrusion Detection and Prevention for Mobile Ecosystems
    Add to Cart The item has been added

    Intrusion Detection and Prevention for Mobile Ecosystems

    This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as...
    $119.12

    Add to Cart The item has been added
  • Cognitive Sensors and IoT Cognitive Sensors and IoT
    Add to Cart The item has been added

    Cognitive Sensors and IoT

    This book presents the Cognitive Information Centric Sensor Network (CICSN) framework for the IoT. This framework is built on top of cognitive nodes, capable of knowledge representation, learning, and reasoning, along with an information-centric approach...
    $119.12

    Add to Cart The item has been added
  • Optical Waves and Laser Beams in the Irregular Atmosphere Optical Waves and Laser Beams in the Irregular Atmosphere
    Add to Cart The item has been added

    Optical Waves and Laser Beams in the Irregular Atmosphere

    The book introduces optical wave propagation in the irregular turbulent atmosphere and the relations to laser beam and LIDAR applications for both optical communication and imaging. It examines atmosphere fundamentals, structure, and content. It explains...
    $119.12

    Add to Cart The item has been added
  • Process Modeling and Management for Healthcare Process Modeling and Management for Healthcare
    Add to Cart The item has been added

    Process Modeling and Management for Healthcare

    From the Foreword:"[This book] provides a comprehensive overview of the fundamental concepts in healthcare process management as well as some advanced topics in the cutting-edge research of the closely related areas. This book is ideal for graduate...
    $119.12

    Add to Cart The item has been added
  • Empirical Research for Software Security Empirical Research for Software Security
    Add to Cart The item has been added

    Empirical Research for Software Security

    Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting...
    $119.12

    Add to Cart The item has been added
  • Autonomous Mobile Robots in Unknown Outdoor Environments Autonomous Mobile Robots in Unknown Outdoor Environments
    Add to Cart The item has been added

    Autonomous Mobile Robots in Unknown Outdoor Environments

    Mobile robots have been increasingly applied in many different scenarios, such as space exploration and search and rescue, where the robots are required to travel over uneven terrain while outdoors. This book provides a new framework and the related...
    $119.12

    Add to Cart The item has been added
  • Recent Advances in Artificial Neural Networks Recent Advances in Artificial Neural Networks
    Add to Cart The item has been added

    Recent Advances in Artificial Neural Networks

    Neural networks represent a new generation of information processing paradigms designed to mimic-in a very limited sense-the human brain. They can learn, recall, and generalize from training data, and with their potential applications limited only by the...
    $86.89

    Add to Cart The item has been added
  • Nature-Inspired Networking Nature-Inspired Networking
    Add to Cart The item has been added

    Nature-Inspired Networking

    "Nature-inspired" includes, roughly speaking, "bio-inspired"+"physical-inspired"+"social-inspired"+ and so on. This book contains highly original contributions about how nature is going to shape networking systems of the future. Hence, it focuses on...
    $119.12

    Add to Cart The item has been added

Computing & Information Technology