Nejnižší cena za posledních 60 dní: 1 738 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
1 Introduction to Internet Computing.- 2 Information Systems Architecture.- 3 Design of Good Information Systems Architectures.- 4 Internet Architectures.- 5 Middleware.- 6 Web services.- 7 Cloud Computing.- 8 Fog and Edge Computing.- 9 Distributed Ledger Technology.- 10 The Internet of Things.- 11 Critical Information Infrastructures.- 12 Emerging Technologies.-
1 Introduction to Internet Computing.- 2 Information Systems Architecture.- 3 Design of Good Information Systems Architectures.- 4 Internet Architectures.- 5 Middleware.- 6 Web services.- 7 Cloud Computing.- 8 Fog and Edge Computing.- 9 Distributed Ledger Technology.- 10 The Internet of Things.- 11
Chapter 1. Cross Domain security model based on Internet of vehicles .- Chapter 2. A framework to improve performance and energy efficiency of Embedded Intelligence Service System.- Chapter 3. Formal verification, testing, inspection for intelligent services.- Chapter 4. QoS for 5G Mobile Services
Cloud computing has recently emerged as a subject of substantial industrial and academic interest, though its meaning and scope is hotly debated. For some researchers, clouds are a natural evolution towards the full commercialisation of grid systems, while others dismiss the term as a mere
This textbook guides students through algebraic specification and verification of distributed systems, and some of the most prominent formal verification techniques. The author employs CRL as the vehicle, a language developed to combine process algebra and abstract data types. The book evolved
Virtual Communion: Theology of the Internet and the Catholic Sacramental Imagination provides a theological account of the internet from a Catholic perspective. It engages digital culture by providing a context for media and mediation within the Catholic tradition, specifically focusing on the
A compelling argument that the Internet of things threatens human rights and security'Sobering and important.'―Financial Times, 'Best Books of 2020: Technology' The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of
As technologies for wireless communications, including 5G and Internet of Things (IoT), require more complex antennas, practitioners need more information on the best methods to perform measurements on these different types of
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to
Provides results from 10 European research projects on IoT, cybersecurity, and privacy Offers a portal into findings of several international organizations and standard development organizations Presents contributions from mix of top experts in IoT and privacy law, providing a comprehensive view on
From atoms and X-rays to the Big Bang and the Internet, brilliant breakthroughs by successful scientists have changed the world. Dip inside this intriguing book to read the stories of 100 scientists and their amazing discoveries, including Marie Curie and Albert
This textbook reviews and systematically presents the use of the Internet in public administration and politics. Further, it employs a process-oriented layer model to define the opportunities for exchange and participation for all stakeholder groups, covering the following topics: eAssistance,
The essential introduction to the principles and applications of feedback systems--now fully revised and expandedThis textbook covers the mathematics needed to model, analyze, and design feedback systems. Now more user-friendly than ever, this revised and expanded edition of Feedback Systems is a
In its first edition, this book helped to define the emerging field of ecological economics. This new edition surveys the field today. It incorporates all of the latest research findings and grounds economic inquiry in a more robust understanding of human needs and behavior. Humans and ecological
A general framework for constructing and using probabilistic models of complex systems that would enable a computer to use available information for making decisions.Most tasks require a person or an automated system to reason--to reach conclusions based on available information. The framework of
The hilarious collected messages of one man who's just trying to make friends and can't understand why everyone always gets so
Discusses recent advances of cyber-physical systems and its application within the health, information, and computer science industries. The book features research on a range of topics, including autonomous agents, power supply methods, and software
Chapter 1. Introduction and Basic Principles.- Chapter 2. Development of Additive Manufacturing Technology.- Chapter 3. Generalized Additive Manufacturing Process Chain.- Chapter 4. Vat Photopolymerization.- Chapter 5. Powder Bed Fusion.- Chapter 6. Material Extrusion.- Chapter 7. Material
This text develops a comprehensive theory of programming languages based on type systems and structural operational semantics. Language concepts are precisely defined by their static and dynamic semantics, presenting the essential tools both intuitively and rigorously while relying on only
The Internet and smartphone are just the latest in a 250 year long cycle of disruption that has continuously changed the way we live, the way we work and the way we interact. The coming Augmented Age, however, promises a level of disruption, behavioral shifts and changes that are unparalleled
Model checking is one of the most successful verification techniques and has been widely adopted in traditional computing and communication hardware and software industries. This book provides the first systematic introduction to model checking techniques applicable to quantum systems, with broad
Examines the latest scholarly material on the use of adaptive and assistive technologies in aviation to establish clear guidelines for the design and implementation of such technologies to better serve the needs of both military and civilian
Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning