0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (831)
  • R500+ (14,090)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Handbook of Research on Advancing Cybersecurity for Digital Transformation (Hardcover): Kamaljeet Sandhu Handbook of Research on Advancing Cybersecurity for Digital Transformation (Hardcover)
Kamaljeet Sandhu
R8,119 Discovery Miles 81 190 Ships in 10 - 15 working days

Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, and many times invisible cyber attackers are never traced or can never be found. Cyberattacks can only be known once the attack and the destruction have already taken place long after the attackers have left. Cybersecurity for computer systems has increasingly become important because the government, military, corporate, financial, critical infrastructure, and medical organizations rely heavily on digital network systems, which process and store large volumes of data on computer devices that are exchanged on the internet, and they are vulnerable to ""continuous"" cyberattacks. As cybersecurity has become a global concern, it needs to be clearly understood, and innovative solutions are required. Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges looks deeper into issues, problems, and innovative solutions and strategies that are linked to cybersecurity. This book will provide important knowledge that can impact the improvement of cybersecurity, which can add value in terms of innovation to solving cybersecurity threats. The chapters cover cybersecurity challenges, technologies, and solutions in the context of different industries and different types of threats. This book is ideal for cybersecurity researchers, professionals, scientists, scholars, and managers, as well as practitioners, stakeholders, researchers, academicians, and students interested in the latest advancements in cybersecurity for digital transformation.

Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover):... Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover)
Amit Kumar Tyagi, Ajith Abraham, Farookh Khadeer Hussain, Arturas Kaklauskas, R. Jagadeesh Kannan
R4,214 R3,789 Discovery Miles 37 890 Save R425 (10%) Ships in 10 - 15 working days

Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, finance, insurance and retail. The next generation of automated applications will command machines to do tasks better and more efficiently. Both industry and academic researchers are looking at transforming applications using machine learning and deep learning to build better models and by taking advantage of the decentralized nature of Blockchain. But the advent of these new technologies also brings very high expectations to industries, organisations and users. The decrease of computing costs, the improvement of data integrity in Blockchain, and the verification of transactions using Machine Learning are becoming essential goals. This edited book covers the challenges, opportunities, innovations, new concepts and emerging trends related to the use of machine learning, Blockchain and Big Data analytics for IoTs. The book is aimed at a broad audience of ICTs, data science, machine learning and cybersecurity researchers interested in the integration of these disruptive technologies and their applications for IoTs.

Wearable Devices - the Big Wave of Innovation (Hardcover): Noushin Nasiri Wearable Devices - the Big Wave of Innovation (Hardcover)
Noushin Nasiri
R3,321 Discovery Miles 33 210 Ships in 10 - 15 working days
AWS Marketplace User Guide (Hardcover): Documentation Team AWS Marketplace User Guide (Hardcover)
Documentation Team
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days
Computer Science Security - Concepts and Tools (Hardcover): AS Zaidoun Computer Science Security - Concepts and Tools (Hardcover)
AS Zaidoun
R3,775 Discovery Miles 37 750 Ships in 10 - 15 working days

This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to secure legacy software and hardware. Computing has infiltrated all fields nowadays. No one can escape this wave and be immune to security attacks, which continue to evolve, gradually reducing the level of expertise needed by hackers. It is high time for each and every user to acquire basic knowledge of computer security, which would enable them to mitigate the threats they may face both personally and professionally. It is this combined expertise of individuals and organizations that will guarantee a minimum level of security for families, schools, the workplace and society in general.

Amazon Inspector User Guide (Hardcover): Documentation Team Amazon Inspector User Guide (Hardcover)
Documentation Team
R955 Discovery Miles 9 550 Ships in 10 - 15 working days
Computing in Communication Networks - From Theory to Practice (Paperback): Frank H. P. Fitzek, Fabrizio Granelli, Patrick... Computing in Communication Networks - From Theory to Practice (Paperback)
Frank H. P. Fitzek, Fabrizio Granelli, Patrick Seeling
R2,832 Discovery Miles 28 320 Ships in 12 - 19 working days

Computing in Communication Networks: From Theory to Practice provides comprehensive details and practical implementation tactics on the novel concepts and enabling technologies at the core of the paradigm shift from store and forward (dumb) to compute and forward (intelligent) in future communication networks and systems. The book explains how to create virtualized large scale testbeds using well-established open source software, such as Mininet and Docker. It shows how and where to place disruptive techniques, such as machine learning, compressed sensing, or network coding in a newly built testbed. In addition, it presents a comprehensive overview of current standardization activities. Specific chapters explore upcoming communication networks that support verticals in transportation, industry, construction, agriculture, health care and energy grids, underlying concepts, such as network slicing and mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN, disruptive innovations, such as network coding, compressed sensing and machine learning, how to build a virtualized network infrastructure testbed on one's own computer, and more.

Internet of Things (IoT) for Automated and Smart Applications (Hardcover): Yasser Ismail Internet of Things (IoT) for Automated and Smart Applications (Hardcover)
Yasser Ismail
R3,324 Discovery Miles 33 240 Ships in 10 - 15 working days
AWS CodeCommit User Guide (Hardcover): Documentation Team AWS CodeCommit User Guide (Hardcover)
Documentation Team
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days
AWS Step Functions Developer Guide (Hardcover): Documentation Team AWS Step Functions Developer Guide (Hardcover)
Documentation Team
R1,248 Discovery Miles 12 480 Ships in 10 - 15 working days
AWS Organizations User Guide (Hardcover): Documentation Team AWS Organizations User Guide (Hardcover)
Documentation Team
R968 Discovery Miles 9 680 Ships in 10 - 15 working days
Amazon Polly Developer Guide (Hardcover): Documentation Team Amazon Polly Developer Guide (Hardcover)
Documentation Team
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days
TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R970 R875 Discovery Miles 8 750 Save R95 (10%) Ships in 10 - 15 working days
CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition): M. Chapple CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition)
M. Chapple
R1,042 R893 Discovery Miles 8 930 Save R149 (14%) Ships in 10 - 15 working days

Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601. Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Perfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.

Innovations in the Industrial Internet of Things (IIoT) and Smart Factory (Hardcover): Sam Goundar, J Avanija, Gurram Sunitha,... Innovations in the Industrial Internet of Things (IIoT) and Smart Factory (Hardcover)
Sam Goundar, J Avanija, Gurram Sunitha, K Reddy Madhavi, S. Bharath Bhushan
R6,780 Discovery Miles 67 800 Ships in 10 - 15 working days

Industrial internet of things (IIoT) is changing the face of industry by completely redefining the way stakeholders, enterprises, and machines connect and interact with each other in the industrial digital ecosystem. Smart and connected factories, in which all the machinery transmits real-time data, enable industrial data analytics for improving operational efficiency, productivity, and industrial processes, thus creating new business opportunities, asset utilization, and connected services. IIoT leads factories to step out of legacy environments and arcane processes towards open digital industrial ecosystems. Innovations in the Industrial Internet of Things (IIoT) and Smart Factory is a pivotal reference source that discusses the development of models and algorithms for predictive control of industrial operations and focuses on optimization of industrial operational efficiency, rationalization, automation, and maintenance. While highlighting topics such as artificial intelligence, cyber security, and data collection, this book is ideally designed for engineers, manufacturers, industrialists, managers, IT consultants, practitioners, students, researchers, and industrial industry professionals.

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,275 Discovery Miles 12 750 Ships in 10 - 15 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

From Logistic Networks to Social Networks - Similarities, Specificities, Modeling, Evaluation (Hardcover): Bourrieres From Logistic Networks to Social Networks - Similarities, Specificities, Modeling, Evaluation (Hardcover)
Bourrieres
R3,765 Discovery Miles 37 650 Ships in 10 - 15 working days

As a result of its widespread implementation in economic and social structures, the network concept appears to be a paradigm of the contemporary world. The need for various services - transport, energy, consumption of manufacturing goods, provision of care, information and communication, etc. - draws users into interwoven networks which are meshes of material and immaterial flows. In this context, the user is a consumer of goods and services from industries and administrations, or they themselves are part of the organization (digital social networks). This book examines the invariants that unify networks in their diversity, as well as the specificities that differentiate them. It provides a reading grid that distinguishes a generic level where these systems find a common interpretation, and a specific level where appropriate analytical methods are used. Three case studies from different fields are presented to illustrate the purpose of the book in detail.

The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover): Niels Starling The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover)
Niels Starling
R750 Discovery Miles 7 500 Ships in 10 - 15 working days
Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition): Olof Liberg,... Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition)
Olof Liberg, Marten Sundberg, Eric Wang, Johan Bergman, Joachim Sachs, …
R2,551 Discovery Miles 25 510 Ships in 12 - 19 working days

Cellular Internet of Things: From Massive Deployments to Critical 5G Applications, Second Edition, gives insights into the recent and rapid work performed by the 3rd Generation Partnership Project (3GPP) and the Multefire Alliance (MFA) to develop systems for the Cellular IoT. Beyond the technologies, readers will learn what the mMTC and cMTC market segments look like, deployment options and expected performance in terms of system capacity, expected battery lifetime, data throughput, access delay time and device cost, regulations for operation in unlicensed frequency bands, and how they impact system design and performance. This new edition contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT features in 3GPP Release 15, critical communication, i.e. URLLC, specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT for unlicensed frequency bands specified in the Multefire Alliance (MFA), and an updated outlook of what the future holds in Industrial IoT and drone communications, amongst other topics.

Amazon EC2 Auto Scaling User Guide (Hardcover): Documentation Team Amazon EC2 Auto Scaling User Guide (Hardcover)
Documentation Team
R1,255 Discovery Miles 12 550 Ships in 10 - 15 working days
Air Route Networks Through Complex Networks Theory (Paperback): Jose M Sallan, Oriol Lordan Air Route Networks Through Complex Networks Theory (Paperback)
Jose M Sallan, Oriol Lordan
R2,674 Discovery Miles 26 740 Ships in 12 - 19 working days

Air Route Networks through Complex Networks Theory connects theory research with network connectivity analysis, providing practitioners with the tools they need to develop more efficient, resilient and profitable air route networks. The book helps airline route planners and executives create more robust route networks that are less vulnerable to disruptions, such as node isolation. The book further explores errors and attacks in complex networks, strategies for detecting critical nodes and cascading failure models to assess and maximize robustness. The book explains how to measure air route network connectivity with complex network representations. Air transport is among the most dynamic and toughest competition industries in today's global economy. The quality of air route network design is a key strategic factor in an airline's viability. These robust networks provide for more stable and secure carrier operations vs. those based simply on existing supply and demand volumes. Node-specific and network-specific representations are covered, along with in-depth coverage of connectivity in special and temporal networks. These collective tools serve as a guide for practitioners seeking to apply complex network theory to the airline industry.

Architecture and Security Issues in Fog Computing Applications (Hardcover): Sam Goundar, S. Bharath Bhushan, Praveen Kumar... Architecture and Security Issues in Fog Computing Applications (Hardcover)
Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani
R6,425 Discovery Miles 64 250 Ships in 10 - 15 working days

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Sensor Network Methodologies for Smart Applications (Hardcover): Salahddine Krit, Valentina Emilia Balas, Mohamed Elhoseny,... Sensor Network Methodologies for Smart Applications (Hardcover)
Salahddine Krit, Valentina Emilia Balas, Mohamed Elhoseny, Rachid Benlamri, Marius M. Balas
R5,805 Discovery Miles 58 050 Ships in 10 - 15 working days

Technologies in today's society are rapidly developing at a pace that is challenging to stay up to date with. As an increasing number of global regions are implementing smart methods and strategies for sustainable development, they are continually searching for modern advancements within computer science, sensor networks, software engineering, and smart technologies. A compilation of research is needed that displays current applications of computing methodologies in the progression of global cities and how smart technologies are being utilized. Sensor Network Methodologies for Smart Applications is a collection of innovative research on the methods of intelligent systems and technologies and their various applications within sustainable development practices. While highlighting topics including machine learning, network security, and optimization algorithms, this book is ideally designed for researchers, scientists, developers, programmers, engineers, educators, policymakers, geographers, planners, and students seeking current research on smart technologies and sensor networks.

Applying Integration Techniques and Methods in Distributed Systems (Hardcover): Gabor Kecskemeti Applying Integration Techniques and Methods in Distributed Systems (Hardcover)
Gabor Kecskemeti
R6,562 Discovery Miles 65 620 Ships in 10 - 15 working days

Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.

Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous... Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings (Hardcover)
Daphne Tuncer, Robert Koch, Remi Badonnel
R1,453 Discovery Miles 14 530 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,557 Discovery Miles 15 570
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160

 

Partners