Networking

Yayınevi/Marka
8 öğeden 1-8 arası gösteriliyor.
Sayfa  1 - 1
  • Java Gems: Jewels from Java Report (SIGS Reference Library)

    Karton Kapak
    The support of Java Report by the pioneers of the language has always made it the source for Java development. From the very beginnings of Java, Java Report was there, examining each new aspect of the language with a clear independent eye. Now, Dwight Deugo, the editor of Java Report, has gathered the most important articles from the first year of the magazine. Written by a savvy Who's Who of industry experts, Java Gems covers today's most important aspects of Java development. Top writers and developers walk you through the topic areas that are essential to today's Java developers, including multitasking, design patterns, class libraries, persistence, distributed computing, and Java vs C++.
    32,66  TL120,96  TL
  • Prefiguring Cyberculture: An Intellectual History

    Prefiguring Cyberculture: An Intellectual History

    Karton Kapak
    The vast social apparatus of the computer network has aligned people with technology in unprecedented ways. The intimacy of the human-computer interface has made it impossible to distinguish technology from the social and cultural business of being human. Cyberculture is the broader name given to this process of becoming through technological means. This book shows that cyberculture has been a long time coming.In Prefiguring Cyberculture, media critics and theorists, philosophers, and historians of science explore the antecedents of such aspects of contemporary technological culture as the Internet, the World Wide Web, artificial intelligence, genetic engineering, virtual reality, and the cyborg. The contributors examine key texts that anticipate cybercultural practice and theory, including Plato's "Simile of the Cave"; the Renaissance Ars Memoria; Descartes's Meditations (on the mind-body split); Mary Shelley's Frankenstein; Alan Turing's Computing Machinery and Intelligence; Philip K. Dick's Man, Android, and Machine; William Gibson's Neuromancer; and Arthur C. Clarke's Profiles of the Future. In the final section, a number of cyberculture artists explore how cybercultural themes have been taken up and critiqued in the electronic arts.This book is not for sale in Australia and New Zealand
    Temin Edilemiyor
  • The Business of Ecommerce: From Corporate Strategy to Technology (Breakthroughs in Application Development)

    The Business of Ecommerce: From Corporate Strategy to Technology (Breakthroughs in Application Development)

    Karton Kapak
    The Business of Ecommerce explains how to conduct business over the Web. Accessible and useful to both technical and nontechnical readers, the book describes the relevant business issues to technologists and technical issues to business managers. Paul May combines his experience as a consultant to both blue chip companies and Internet startups to provide a generic model for understanding ecommerce opportunities. He makes accessible all of the relevant technologies. This book empowers technical and business decision-makers to maximize the opportunities of ecommerce.
    Temin Edilemiyor
  • Cellular Neural Networks and Visual Computing: Foundations and Applications

    Cellular Neural Networks and Visual Computing: Foundations and Applications

    Sert Kapak
    Cellular Nonlinear/Neural Network (CNN) technology is both a revolutionary concept and an experimentally proven new computing paradigm. Analogic cellular computers based on CNNs are set to change the way analog signals are processed. This unique undergraduate level textbook includes many examples and exercises, including CNN simulator and development software accessible via the Internet. It is an ideal introduction to CNNs and analogic cellular computing for students, researchers and engineers from a wide range of disciplines. Leon Chua, co-inventor of the CNN, and Tamàs Roska are both highly respected pioneers in the field.
    Temin Edilemiyor
  • Self-Stabilization

    Self-Stabilization

    Sert Kapak
    Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.
    Temin Edilemiyor
  • Access Contested: Security, Identity, and Resistance in Asian Cyberspace (Information Revolution and Global Politics)

    Access Contested: Security, Identity, and Resistance in Asian Cyberspace (Information Revolution and Global Politics)

    Karton Kapak
    A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China--home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.The hardcover edition does not include a dust jacket.
    Temin Edilemiyor
  • Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services

    Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services

    Sert Kapak
    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.
    Temin Edilemiyor
  • Computer Networking:A Top-Down Approach

    Computer Networking:A Top-Down Approach

    Karton Kapak
    Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors-and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture.
    Temin Edilemiyor