0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (342)
  • R250 - R500 (892)
  • R500+ (13,970)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Nagios 3 Enterprise Network Monitoring - Including Plug-Ins and Hardware Devices (Paperback): Max Schubert, Derrick Bennett,... Nagios 3 Enterprise Network Monitoring - Including Plug-Ins and Hardware Devices (Paperback)
Max Schubert, Derrick Bennett, Jonathan Gines, Andrew Hay, John Strand
R1,091 Discovery Miles 10 910 Ships in 12 - 17 working days

The future for Nagios in the enterprise is certainly bright! "Nagios 3 Enterprise Network Monitoring" can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.
* Complete Case Study Demonstrates how to Deploy Nagios Globally in an Enterprise Network
* Monitor Third Party Hardware Devices with Nagios

Network Security: Know It All (Hardcover): James Joshi Network Security: Know It All (Hardcover)
James Joshi
R1,672 Discovery Miles 16 720 Ships in 12 - 17 working days

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Examples illustrate core security concepts for enhanced comprehension

Nessus Network Auditing (Paperback, 2nd edition): Russ Rogers Nessus Network Auditing (Paperback, 2nd edition)
Russ Rogers
R1,037 Discovery Miles 10 370 Ships in 12 - 17 working days

The Updated Version of the Bestselling Nessus Book.
This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.
* Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access.
* Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins.
* Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus.
* Understand Scanner Logic and Determine Actual Risk
Plan your scanning strategy and learn what variables can be changed.
* Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.
* Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests.
* Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).
* Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.
* Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.
* The first edition is still the only book available on the product.
* Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

Microsoft Exchange Server 2007 with SP1 - Tony Redmond's Guide to Successful Implementation (Paperback): Tony Redmond Microsoft Exchange Server 2007 with SP1 - Tony Redmond's Guide to Successful Implementation (Paperback)
Tony Redmond
R1,288 Discovery Miles 12 880 Ships in 12 - 17 working days

Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality.
Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:
*install enabling on Windows Server 2008
*IVp6 support
*Unified Messaging inclusion
*EMC enhancements
*Client Access Improvements for Outlook Web Access and Activesync
*New user interfaces for POP3 and IMAP4
*System resource monitoring and message routing improvements
*New features for the mailbox server role
*.pst file data managment improvements
*new high-availability features
*optimization for mobile access
*and much more
*Complete coverage of all the updates in SP1 ensure admins skip the initial 2007 release's bugs and upgrade with ease
*Written by HP Services CTO Tony Redmond, the world's most trusted author of Exchange books for over a decade
*250+ pages of updates throughout, including totally new sections on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and 6.1 devices, Apple iPhone, and more

MPLS: Next Steps, Volume 1 (Hardcover): Bruce S. Davie, Adrian Farrel MPLS: Next Steps, Volume 1 (Hardcover)
Bruce S. Davie, Adrian Farrel
R1,730 Discovery Miles 17 300 Ships in 12 - 17 working days

SHORT DESCRIPTION:
Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has resulted in the abandoning of some of the original features of MPLS, and the development of other new features. MPLS has moved from a prospective solution, to a grown-up technology. Now that MPLS has reached this level of maturity, these new tools and features allow more sophisticated services to the users of the network. These tools and features are discussed within various contexts throughout several networking-related books published by MK and this presents us with a unique publishing opportunity.
The proposed book is a best-of-the-best collection of existing content from several books MK has published in recent years on MPLS technology (multi-label protocol switching). Individual chapters on MPLS technology are derived from a handful of MK books and are combined in one new volume in a way that makes sense as a reference work for those interested in new and developing aspects of this technology, i.e., network operators and designers who need to determine which aspects of their networks would benefit from MPLS technology and applications. It also serves as a definitive reference for engineers implementing MPLS-based products.
This book represents a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources. Suitable and current content will be collected from the following titles: Evans, Deploying IP and MPLS QoS (2006); Farrel, GMPLS (2005); Ash, Traffic Engineering (2006); Vasseur, Network Recovery (2005); Farrel, The Internet and Its Protocols (2004); Nadeau, MPLS Management (2003); and Davie, MPLS Technology and Applications (2000). These chapters will be updated where necessary and two new chapters will be added at the beginning and the end of the book to bring the content into focus and discuss next generation developments.

* Coverage of major applications of MPLS such as traffic engineering, VPNs, IP integration, GMPLS, and QoS written by leading experts in the field contributes to your practical knowledge of this key technology
* Shows you how to implement various MPLS applications that will result in saving your organization time and money
* Shows you how you can evaluate MPLS applications and techniques in relation to one another so you can develop an optimum network design

The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM... The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM (Paperback)
Brien Posey
R1,051 Discovery Miles 10 510 Ships in 12 - 17 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback): Brien Posey The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback)
Brien Posey
R1,037 Discovery Miles 10 370 Ships in 12 - 17 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.

* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019): Aboul... Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny
R4,145 Discovery Miles 41 450 Ships in 12 - 17 working days

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.

Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback): Constantine Photopoulos Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback)
Constantine Photopoulos
R1,296 Discovery Miles 12 960 Ships in 12 - 17 working days

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.
*Addresses a very topical subject of great concern to security, general IT and business management
*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data.
*Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues

Ranking Queries on Uncertain Data (Hardcover, 2011 ed.): Ming Hua, Jian Pei Ranking Queries on Uncertain Data (Hardcover, 2011 ed.)
Ming Hua, Jian Pei
R4,135 Discovery Miles 41 350 Ships in 12 - 17 working days

Uncertain data is inherent in many important applications, such as environmental surveillance, market analysis, and quantitative economics research. Due to the importance of those applications and rapidly increasing amounts of uncertain data collected and accumulated, analyzing large collections of uncertain data has become an important task. Ranking queries (also known as top-k queries) are often natural and useful in analyzing uncertain data.

"Ranking Queries on Uncertain Data" discusses the motivations/applications, challenging problems, the fundamental principles, and the evaluation algorithms of ranking queries on uncertain data. Theoretical and algorithmic results of ranking queries on uncertain data are presented in the last section of this book. "Ranking Queries on Uncertain Data" is the first book to systematically discuss the problem of ranking queries on uncertain data.

Wireless Networking (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Wireless Networking (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R1,874 Discovery Miles 18 740 Ships in 12 - 17 working days

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous "WiFi" networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field.
*Goes beyond descriptive and qualitative treatments, by presenting the foundations underlying the various wireless networking technologies
*Provides abstractions, models and analyses of established and emerging wireless networks, thereby supplying the reader with a conceptual and quantitative treatment, thus ensuring longevity of the learning from this material
*Aids comprehension by including over 120 figures, four appendices on the mathematics of the various models, several inline exercises, and extensive problem sets at the end of each chapter

Wi-Fi (TM), Bluetooth (TM), Zigbee (TM) and WiMax (TM) (Hardcover, 2007 ed.): Houda Labiod, Hossam Afifi, Costantino De Santis Wi-Fi (TM), Bluetooth (TM), Zigbee (TM) and WiMax (TM) (Hardcover, 2007 ed.)
Houda Labiod, Hossam Afifi, Costantino De Santis
R5,213 Discovery Miles 52 130 Ships in 12 - 17 working days

The book provides a complete and detailed description of the recent wireless technologies including Wi-Fi, Bluetooth, ZigBee and WiMAX. These technologies are considered to be important topics in the telecommunication industry in the next decade. Some critical subjects are particularly developed such as security, quality of service, roaming and power conservation. The book also includes some chapters on practical aspects.

Privacy in a Cyber Age - Policy and Practice (Hardcover): Amitai Etzioni, Christopher J. Rice Privacy in a Cyber Age - Policy and Practice (Hardcover)
Amitai Etzioni, Christopher J. Rice
R1,903 Discovery Miles 19 030 Ships in 12 - 17 working days

This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be carried out. In studying these matters, the book examines the privacy issues raised by the NSA, publication of state secrets, and DNA usage.

Nmap in the Enterprise - Your Guide to Network Scanning (Paperback): Angela Orebaugh, Becky Pinkard Nmap in the Enterprise - Your Guide to Network Scanning (Paperback)
Angela Orebaugh, Becky Pinkard
R1,295 Discovery Miles 12 950 Ships in 12 - 17 working days

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.
-Understand Network Scanning
Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies.
-Get Inside Nmap
Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques.
-Install, Configure, and Optimize Nmap
Deploy Nmap on Windows, Linux, Mac OS X, and install from source.
-Take Control of Nmap with the Zenmap GUI
Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results.
-Run Nmap in the Enterprise
Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions
-Raise those Fingerprints
Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan.
-"Tool" around with Nmap
Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser.
-Analyze Real-WorldNmap Scans
Follow along with the authors to analyze real-world Nmap scans.
-Master Advanced Nmap Scanning Techniques
Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.

WDMA Optical Networks (Hardcover): Andrea Borella, G. Cancellieri, F. Chiaraluce WDMA Optical Networks (Hardcover)
Andrea Borella, G. Cancellieri, F. Chiaraluce
R3,864 Discovery Miles 38 640 Ships in 10 - 15 working days

Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.

Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach (Hardcover, 1st ed. 2018): Michel Raynal Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach (Hardcover, 1st ed. 2018)
Michel Raynal
R2,314 Discovery Miles 23 140 Ships in 12 - 17 working days

This book presents the most important fault-tolerant distributed programming abstractions and their associated distributed algorithms, in particular in terms of reliable communication and agreement, which lie at the heart of nearly all distributed applications. These programming abstractions, distributed objects or services, allow software designers and programmers to cope with asynchrony and the most important types of failures such as process crashes, message losses, and malicious behaviors of computing entities, widely known under the term "Byzantine fault-tolerance". The author introduces these notions in an incremental manner, starting from a clear specification, followed by algorithms which are first described intuitively and then proved correct. The book also presents impossibility results in classic distributed computing models, along with strategies, mainly failure detectors and randomization, that allow us to enrich these models. In this sense, the book constitutes an introduction to the science of distributed computing, with applications in all domains of distributed systems, such as cloud computing and blockchains. Each chapter comes with exercises and bibliographic notes to help the reader approach, understand, and master the fascinating field of fault-tolerant distributed computing.

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure... An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure Protection (Hardcover, 2012)
S.V. Raghavan, E. Dawson
R2,979 Discovery Miles 29 790 Ships in 10 - 15 working days

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover): Francesca... Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover)
Francesca Comunello
R4,854 Discovery Miles 48 540 Ships in 12 - 17 working days

The recent popularity of Social Network Sites (SNS) shows that there is a growing interest in articulating, making visible, and managing personal or professional relationships through technology-enabled environments. Networked Sociability and Individualism: Technology for Personal and Professional Relationships provides a multidisciplinary framework for analyzing the new forms of sociability enabled by digital media and networks. This book focuses on a variety of social media and computer-mediated communication environments with the aim of identifying and understanding different types of social behavior and identity expression.

Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise - A selection of common capabilities validated... Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise - A selection of common capabilities validated in real-life business trials by the BEinGRID consortium (Hardcover, 2010 ed.)
Theo Dimitrakos, Josep Martrat, Stefan Wesner
R2,939 Discovery Miles 29 390 Ships in 10 - 15 working days

Service-Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption by business. Their use may enable enterprises to achieve optimal IT utilization, including sharing resources and services across enterprises and on-demand utilization of those made available by business partners over the network. This book is an essential reference for researchers and practitioners in service-oriented IT. It analyses a selection of common capabilities (services capturing reusable functionality of IT solutions) that have been applied to tackle challenging business problems and were validated by the BEinGRID consortium in real-life business trials covering most European market sectors.

Software Defined Networks - A Comprehensive Approach (Paperback): Paul Goransson, Chuck Black Software Defined Networks - A Comprehensive Approach (Paperback)
Paul Goransson, Chuck Black
R1,062 Discovery Miles 10 620 Ships in 12 - 17 working days

"Software Defined Networks" discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN modelHow to make intelligent decisions about when to integrate SDN technologies in a networkHow to decide if your organization should be developing its own SDN applications or looking to acquire these from an outside vendorHow to accelerate the ability to develop your own SDN application, be it entirely novel or a more efficient approach to a long-standing problem
Discusses the evolution of the switch platforms that enable SDN Addresses when to integrate SDN technologies in a networkProvides an overview of sample SDN applications relevant to different industriesIncludes practical examples of how to write SDN applications

Innovation in Manufacturing Networks - Eighth IFIP International Conference on Information Technology for Balanced Automation... Innovation in Manufacturing Networks - Eighth IFIP International Conference on Information Technology for Balanced Automation Systems, Porto, Portugal, June 23-25, 2008 (Hardcover, 2008 ed.)
Americo Azevedo
R3,150 Discovery Miles 31 500 Ships in 10 - 15 working days

Innovation in Manufacturing Networks A fundamental concept of the emergent business, scientific and technological paradigms ces area, innovation the ability to apply new ideas to products, processes, organizational practices and business models - is crucial for the future competitiveness of organizations in a continually increasingly globalised, knowledge-intensive marketplace. Responsiveness, agility as well as the high performance of manufacturing systems is responsible for the recent changes in addition to the call for new approaches to achieve cost-effective responsiveness at all the levels of an enterprise. Moreover, creating appropriate frameworks for exploring the most effective synergies between human potential and automated systems represents an enormous challenge in terms of processes characterization, modelling, and the development of adequate support tools. The implementation and use of Automation Systems requires an ever increasing knowledge of enabling technologies and Business Practices. Moreover, the digital and networked world will surely trigger new business practices. In this context and in order to achieve the desired effective and efficiency performance levels, it is crucial to maintain a balance between both the technical aspects and the human and social aspects when developing and applying new innovations and innovative enabling technologies. BASYS conferences have been developed and organized so as to promote the development of balanced automation systems in an attempt to address the majority of the current open issues.

Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm - Trends, Advances, and Future Prospects (Hardcover, 1st ed.... Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm - Trends, Advances, and Future Prospects (Hardcover, 1st ed. 2020)
Pawel Sniatala, M. Hadi Amini, Kianoosh G. Boroojeni
R3,443 Discovery Miles 34 430 Ships in 10 - 15 working days

This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios. This book celebrates S.S. Iyengar's accomplishments that led to his 2019 Institute of Electrical and Electronics Engineers' (IEEE) Cybermatics Congress "Test of Time Award" for his work on creating Brooks-Iyengar Algorithm and its impact in advancing modern computing.

The Best Damn Firewall Book Period (Paperback, 2nd edition): Thomas W. Shinder The Best Damn Firewall Book Period (Paperback, 2nd edition)
Thomas W. Shinder
R1,334 Discovery Miles 13 340 Ships in 12 - 17 working days

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.
Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.
Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.
New to this Edition:
* Microsoft firewall protection, from Windows Firewall to ISA Server 2006
* Cisco PIX Version 7, including VPN configuration and IDS
* Analyzing Firewall Logs and Reports
* VoIP and Firewall Bypassing

Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,479 Discovery Miles 44 790 Ships in 12 - 17 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

High Performance Parallel Computing (Hardcover): Satyadhyan Chickerur High Performance Parallel Computing (Hardcover)
Satyadhyan Chickerur
R3,375 Discovery Miles 33 750 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Twelve Secrets
Robert Gold Paperback R408 R345 Discovery Miles 3 450
In Too Deep
Lee Child, Andrew Child Paperback R385 R280 Discovery Miles 2 800
One Night, New York
Lara Thompson Paperback R454 R302 Discovery Miles 3 020
13-Minute Murder
James Patterson Paperback  (1)
R249 R210 Discovery Miles 2 100
Zeus Van Wyngaardt En Die Skrikgodin
Julio Agrella Paperback R306 Discovery Miles 3 060
The Darkest Evening
Ann Cleeves Paperback  (1)
R434 Discovery Miles 4 340
The Interpreter
Brooke Robinson Paperback R343 Discovery Miles 3 430
Love Marry Kill
Zukiswa Wanner Paperback R320 R275 Discovery Miles 2 750
Droomjagter
Leon van Nierop Paperback R340 R266 Discovery Miles 2 660
The Kind Worth Saving
Peter Swanson Paperback R260 Discovery Miles 2 600

 

Partners