Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
Money market. Capital market --- Investment management --- Investments --- Finance --- Investissements --- Finances --- Mathematical models --- Modèles mathématiques --- Mathematical models. --- 336.767 --- 336.7 --- -Investments --- -AA / International- internationaal --- 339.4 --- Investing --- Portfolio --- Disinvestment --- Loans --- Saving and investment --- Speculation --- Funding --- Funds --- Economics --- Currency question --- Investering. Belegging. Portfolio. Portfoliotheorie. --(toepassing voor kapitaalkosten in de onderneming zie {658.15}) --- Geldwezen. Kredietwezen. Bankwezen. Financien. Monetaire econonomie. Beurswezen --- Vermogensbeheer. Financiële analyse. Verspreiding van de beleggingsrisico's. --- 336.7 Geldwezen. Kredietwezen. Bankwezen. Financien. Monetaire econonomie. Beurswezen --- 336.767 Investering. Belegging. Portfolio. Portfoliotheorie. --(toepassing voor kapitaalkosten in de onderneming zie {658.15}) --- Modèles mathématiques --- AA / International- internationaal --- Vermogensbeheer. Financiële analyse. Verspreiding van de beleggingsrisico's --- Investments - Mathematical models. --- Finance - Mathematical models.
Choose an application
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
Computer networks. --- Local area networks (Computer networks). --- Wireless communication systems. --- Wireless LANs --- IEEE 802.11 (Standard) --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Wireless LANs. --- Data transmission systems. --- Data communication systems --- Transmission of data --- Wi-Fi LANs --- WiFi LANs --- Wireless local area networks --- WLANs (Wireless LANs) --- Computer science. --- Computer communication systems. --- Computers. --- Computer Science. --- Computer Communication Networks. --- Theory of Computation. --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Local area networks (Computer networks) --- Wireless communication systems --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Choose an application
This easy-to- follow textbook/reference guides the reader through the creation of a fully functional embedded operating system, from its source code, in order to develop a deeper understanding of each component and how they work together. The text describes in detail the procedure for building the bootloader, kernel, filesystem, shared libraries, start-up scripts, configuration files and system utilities, to produce a GNU/Linux operating system. This fully updated second edition also includes new material on virtual machine technologies such as VirtualBox, Vagrant and the Linux container system Docker. Topics and features: Presents an overview of the GNU/Linux system, introducing the components of the system, and covering aspects of process management, input/output and environment Discusses containers and the underlying kernel technology upon which they are based Provides a detailed examination of the GNU/Linux filesystem Explains how to build an embedded system under a virtual machine, and how to build an embedded system to run natively on an actual processor Introduces the concept of the compiler toolchain, and reviews the platforms BeagleBone and Raspberry Pi Describes how to build firmware images for devices running the Openwrt operating system The hands-on nature and clearly structured approach of this textbook will appeal strongly to practically minded undergraduate and graduate level students, as well as to industry professionals involved in this area.
Computer science. --- Operating systems (Computers). --- Computer Science. --- Operating Systems. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Operating systems (Computers)
Choose an application
This practically-oriented textbook/reference provides a clear introduction to the different component parts of an operating system and how these work together. The easy-to-follow text covers the bootloader, kernel, filesystem, shared libraries, start-up scripts, configuration files and system utilities. The procedure for building each component is described in detail, guiding the reader through the process of creating a fully functional GNU/Linux embedded operating system. Topics and features: Presents a concise overview of the GNU/Linux system, and a detailed review of GNU/Linux filesystems Describes how to build an embedded system to run on a virtual machine, and to run natively on an actual processor Introduces the concept of the compiler toolchain, demonstrating how to develop a cross toolchain so that programs can be built on a range of different architectures Discusses the ARM-based platforms BeagleBone and Raspberry Pi Explains how to build OpenWRT firmware images for OMxP Open-mesh devices and the Dragino MS14 series Ideal for undergraduate and graduate level students studying operating systems, the book will also prove to be highly useful to industry professionals involved in this area. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. His publications include the Springer title Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand. Together with Dr. Holt, she is also co-author of the Springer book 802.11 Wireless Networks: Security and Analysis.
Computer science. --- Operating systems (Computers). --- Computer Science. --- Operating Systems. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems
Choose an application
This practically-oriented textbook/reference provides a clear introduction to the different component parts of an operating system and how these work together. The easy-to-follow text covers the bootloader, kernel, filesystem, shared libraries, start-up scripts, configuration files and system utilities. The procedure for building each component is described in detail, guiding the reader through the process of creating a fully functional GNU/Linux embedded operating system. Topics and features: Presents a concise overview of the GNU/Linux system, and a detailed review of GNU/Linux filesystems Describes how to build an embedded system to run on a virtual machine, and to run natively on an actual processor Introduces the concept of the compiler toolchain, demonstrating how to develop a cross toolchain so that programs can be built on a range of different architectures Discusses the ARM-based platforms BeagleBone and Raspberry Pi Explains how to build OpenWRT firmware images for OMxP Open-mesh devices and the Dragino MS14 series Ideal for undergraduate and graduate level students studying operating systems, the book will also prove to be highly useful to industry professionals involved in this area. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. His publications include the Springer title Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand. Together with Dr. Holt, she is also co-author of the Springer book 802.11 Wireless Networks: Security and Analysis.
Computer science --- Computer architecture. Operating systems --- draadloze computernetwerken --- co-creation --- Raspberry Pi --- computers --- OS (operating system) --- computerkunde
Choose an application
This easy-to- follow textbook/reference guides the reader through the creation of a fully functional embedded operating system, from its source code, in order to develop a deeper understanding of each component and how they work together. The text describes in detail the procedure for building the bootloader, kernel, filesystem, shared libraries, start-up scripts, configuration files and system utilities, to produce a GNU/Linux operating system. This fully updated second edition also includes new material on virtual machine technologies such as VirtualBox, Vagrant and the Linux container system Docker. Topics and features: Presents an overview of the GNU/Linux system, introducing the components of the system, and covering aspects of process management, input/output and environment Discusses containers and the underlying kernel technology upon which they are based Provides a detailed examination of the GNU/Linux filesystem Explains how to build an embedded system under a virtual machine, and how to build an embedded system to run natively on an actual processor Introduces the concept of the compiler toolchain, and reviews the platforms BeagleBone and Raspberry Pi Describes how to build firmware images for devices running the Openwrt operating system The hands-on nature and clearly structured approach of this textbook will appeal strongly to practically minded undergraduate and graduate level students, as well as to industry professionals involved in this area.
Computer architecture. Operating systems --- Raspberry Pi --- Docker --- OS (operating system)
Choose an application
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- toegepaste informatica --- computers --- computernetwerken
Choose an application
Money market. Capital market --- Investment management --- Finance --- Investments --- Mathematical models.
Choose an application
Choose an application
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- toegepaste informatica --- computers --- computernetwerken
Listing 1 - 10 of 17 | << page >> |
Sort by
|