0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (322)
  • R250 - R500 (918)
  • R500+ (16,249)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Future of Open Data (Paperback): Pamela Robinson, Teresa Scassa The Future of Open Data (Paperback)
Pamela Robinson, Teresa Scassa
R679 Discovery Miles 6 790 Ships in 12 - 17 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover): T. Ananth Kumar, T. S. Arun Samuel, R.... Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover)
T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy
R3,625 Discovery Miles 36 250 Ships in 9 - 15 working days

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback)
Brij B. Gupta
R1,448 Discovery Miles 14 480 Ships in 12 - 17 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Designing Interaction and Interfaces for Automated Vehicles - User-Centred Ecological Design and Testing (Hardcover): Kirsten... Designing Interaction and Interfaces for Automated Vehicles - User-Centred Ecological Design and Testing (Hardcover)
Kirsten M.A. Revell, Patrick Langdon, Neville Stanton
R4,187 Discovery Miles 41 870 Ships in 12 - 17 working days

Driving automation and autonomy are already upon us and the problems that were predicted twenty years ago are beginning to appear. These problems include shortfalls in expected benefits, equipment unreliability, driver skill fade, and error-inducing equipment designs. Designing Interaction and Interfaces for Automated Vehicles: User-Centred Ecological Design and Testing investigates the difficult problem of how to interface drivers with automated vehicles by offering an inclusive, human-centred design process that focusses on human variability and capability in interaction with interfaces. This book introduces a novel method that combines both systems thinking and inclusive user-centred design. It models driver interaction, provides design specifications, concept designs, and the results of studies in simulators on the test track, and in road going vehicles. This book is for designers of systems interfaces, interactions, UX, Human Factors and Ergonomics researchers and practitioners involved with systems engineering and automotive academics._ "In this book, Prof Stanton and colleagues show how Human Factors methods can be applied to the tricky problem of interfacing human drivers with vehicle automation. They have developed an approach to designing the human-automation interaction for the handovers between the driver and the vehicle. This approach has been tested in driving simulators and, most interestingly, in real vehicles on British motorways. The approach, called User-Centred Ecological Interface Design, has been validated against driver behaviour and used to support their ongoing work on vehicle automation. I highly recommend this book for anyone interested, or involved, in designing human-automation interaction in vehicles and beyond." Professor Michael A. Regan, University of NSW Sydney, AUSTRALIA

Computational Social Science - Proceedings of the 1st International Conference on New Computational Social Science (ICNCSS... Computational Social Science - Proceedings of the 1st International Conference on New Computational Social Science (ICNCSS 2020), September 25-27, 2020, Guangzhou, China (Hardcover)
Wei Luo, Maria CIUREA, Santosh Kumar
R4,562 Discovery Miles 45 620 Ships in 12 - 17 working days

Selected papers from the International Conference on New Computational Social Science, focusing on the following five aspects: Big data acquisition and analysis, Integration of qualitative research and quantitative research, Sociological Internet experiment research, Application of ABM simulation method in Sociology Research, Research and development of new social computing tools. With the rapid development of information technology, especially sweeping progress in the Internet of things, cloud computing, social networks, social media and big data, social computing, as a data-intensive science, is an emerging field that leverages the capacity to collect and analyze data with an unprecedented breadth, depth and scale. It represents a new computing paradigm and an interdisciplinary field of research and application. A broad comprehension of major topics involved in social computing is important for both scholars and practitioners. This proceedings presents and discusses key concepts and analyzes the state-of-the-art of the field. The conference not only gave insights on social computing, but also affords conduit for future research in the field. Social computing has two distinct trends: One is on the social science issues, such as computational social science, computational sociology, social network analysis, etc; The other is on the use of computational techniques. Finally some new challenges ahead are summarized, including interdisciplinary cooperation and training, big data sharing for scientific data mashups, and privacy protect.

Cyber-Physical Systems - Integrated Computing and Engineering Design (Hardcover, New): Fei Hu Cyber-Physical Systems - Integrated Computing and Engineering Design (Hardcover, New)
Fei Hu
R4,020 Discovery Miles 40 200 Ships in 12 - 17 working days

Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one another. A CPS could be a system at multiple scales, from large smart bridges with fluctuation detection and responding functions, to autonomous cars and tiny implanted medical devices. Cyber-Physical Systems: Integrated Computing and Engineering Design supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there. Emphasizes the integration of cyber computing and physical objects control Covers important CPS theory foundations and models Includes interesting case studies of several important civilian and health care applications that illustrate the CPS design process Addresses the collaboration of the sensing and controlling of a physical system with robust software architecture Explains how to account for random failure events that can occur in a real CPS environment Presented in a systematic manner, the book begins by discussing the basic concept underlying CPSs and examining some challenging design issues. It then covers the most important design theories and modeling methods for a practical CPS. Next, it moves on to sensor-based CPSs, which use embedded sensors and actuators to interact with the physical world. The text presents concrete CPS designs for popular civilian applications, including building and energy management. Reflecting the importance of human health care in society, it includes CPS examples of rehabilitation applications such as virtual reality-based disability recovery platforms.

The Complete Project Management Office Handbook (Paperback, 3rd edition): Gerard M. Hill The Complete Project Management Office Handbook (Paperback, 3rd edition)
Gerard M. Hill
R1,456 Discovery Miles 14 560 Ships in 12 - 17 working days

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Illustrating the implications of project management in today's organizations, The Complete Project Management Office Handbook, Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization, this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs, purpose, and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists, detailed process steps, and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management, but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs, the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate "quick-wins" and early PMO-based accomplishments in their organization.

Wireless Sensor Networks - From Theory to Applications (Hardcover, New): Ibrahiem M.M.El Emary, S. Ramakrishnan Wireless Sensor Networks - From Theory to Applications (Hardcover, New)
Ibrahiem M.M.El Emary, S. Ramakrishnan
R4,672 Discovery Miles 46 720 Ships in 12 - 17 working days

Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and considers the theoretical problems in WSN, including issues with monitoring, routing, and power control. It also details methodologies that can provide solutions to these problems. The book's 25 chapters are divided into seven parts: Data Collection Physical Layer and Interfacing Routing and Transport Protocols Energy-Saving Approaches Mobile and Multimedia WSN Data Storage and Monitoring Applications The book examines applications of WSN across a range of fields, including health, military, transportation, and mining. Addressing the main challenges in applying WSNs across all phases of our life, it explains how WSNs can assist in community development. Complete with a list of references at the end of each chapter, this book is ideal for senior undergraduate and postgraduate students, researchers, scholars, academics, industrial researchers, and practicing engineers working on WSNs. The text assumes that readers possess a foundation in computer networks, wireless communication, and basic electronics.

Information Security Management Handbook, Volume 7 (Hardcover, 6th edition): Richard O'Hanley, James S. Tiller Information Security Management Handbook, Volume 7 (Hardcover, 6th edition)
Richard O'Hanley, James S. Tiller
R4,324 Discovery Miles 43 240 Ships in 12 - 17 working days

Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

100 Go Mistakes (Paperback): Teiva Harsanyi 100 Go Mistakes (Paperback)
Teiva Harsanyi
R1,170 R1,098 Discovery Miles 10 980 Save R72 (6%) Ships in 9 - 15 working days

100 Go Mistakes: How to Avoid Them introduces dozens of techniques for writing idiomatic, expressive, and efficient Go code that avoids common pitfalls. By reviewing dozens of interesting, readable examples and real-world case studies, you'll explore mistakes that even experienced Go programmers make. This book is focused on pure Go code, with standards you can apply to any kind of project. As you go, you'll navigate the tricky bits of handling JSON data and HTTP services, discover best practices for Go code organization, and learn how to use slices efficiently. Your code speed and quality will enjoy a huge boost when you improve your concurrency skills, deal with error management idiomatically, and increase the quality of your tests. About the Technology Go is simple to learn, yet hard to master. Even experienced Go developers may end up introducing bugs and inefficiencies into their code. This book accelerates your understanding of Go's quirks, helping you correct mistakes and dodge pitfalls on your path to Go mastery.

Interconnections for Computer Communications and Packet Networks (Paperback): Roberto Rojas-Cessa Interconnections for Computer Communications and Packet Networks (Paperback)
Roberto Rojas-Cessa
R1,967 Discovery Miles 19 670 Ships in 12 - 17 working days

This book introduces different interconnection networks applied to different systems. Interconnection networks are used to communicate processing units in a multi-processor system, routers in communication networks, and servers in data centers. Queuing techniques are applied to interconnection networks to support a higher utilization of resources. There are different queuing strategies, and these determine not only the performance of the interconnection network, but also the set of requirements to make them work effectively and their cost. Routing algorithms are used to find routes to destinations and directions in what information travels. Additional properties, such as avoiding deadlocks and congestion, are sought. Effective routing algorithms need to be paired up with these networks. The book will introduce the most relevant interconnection networks, queuing strategies, and routing algorithm. It discusses their properties and how these leverage the performance of the whole interconnection system. In addition, the book covers additional topics for memory management and congestion avoidance, used to extract higher performance from the interconnection network.

Wireless Ad Hoc and Sensor Networks - Management, Performance, and Applications (Hardcover, New): Jing (Selina) He, Shouling... Wireless Ad Hoc and Sensor Networks - Management, Performance, and Applications (Hardcover, New)
Jing (Selina) He, Shouling Ji, Yingshu Li, Yi Pan
R4,017 Discovery Miles 40 170 Ships in 12 - 17 working days

Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current thinking on the topic, and a discussion of unsolved problems. The book is organized into three sections. Section I introduces the basic concepts of WSNs and their applications, followed by the summarization of the network management techniques used in WSNs. Section II begins by examining virtual backbone-based network management techniques. It points out some of the drawbacks in classical and existing methods and proposes several new network management techniques for WSNs that can address the shortcomings of existing methods. Each chapter in this section examines a new network management technique and includes an introduction, literature review, network model, algorithm description, theoretical analysis, and conclusion. Section III applies proposed new techniques to some important applications in WSNs including routing, data collection, data aggregation, and query processing. It also conducts simulations to verify the performance of the proposed techniques. Each chapter in this section examines a particular application using the following structure: brief application overview, application design and implementation, performance analysis, simulation settings, and comments for different test cases/scenario configurations.

A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Paperback): Meg Tyler A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Paperback)
Meg Tyler
R1,525 Discovery Miles 15 250 Ships in 12 - 17 working days

First published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.

Conflict and Cooperation in Cyberspace - The Challenge to National Security (Hardcover, New): Panayotis A Yannakogeorgos, Adam... Conflict and Cooperation in Cyberspace - The Challenge to National Security (Hardcover, New)
Panayotis A Yannakogeorgos, Adam B Lowther
R3,255 Discovery Miles 32 550 Ships in 12 - 17 working days

Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain. The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book: Delves into the intricacies and considerations cyber strategists must contemplate before engaging in cyber war Offers a framework for determining the best ways to engage other nations in promoting global norms of behavior Illustrates technologies that can enable cyber arms control agreements Dispels myths surrounding Stuxnet and industrial control systems General Michael V. Hayden, former director of the National Security Agency and the Central Intelligence Agency, begins by explaining why the policymakers, particularly those working on cyber issues, must come to understand the policy implications of a dynamic domain. Expert contributors from the Air Force Research Institute, MIT, the Rand Corporation, Naval Postgraduate School, NSA, USAF, USMC, and others examine the challenges involved with ensuring improved cyber security. Outlining the larger ethical, legal, and policy challenges facing government, the private sector, civil society, and individual users, the book offers plausible solutions on how to create an environment where there is confidence in the ability to assure national security, conduct military operations, and ensure a vibrant and stable global economy.

Advanced Location-Based Technologies and Services (Hardcover, Revised): Hassan A. Karimi Advanced Location-Based Technologies and Services (Hardcover, Revised)
Hassan A. Karimi
R4,610 Discovery Miles 46 100 Ships in 12 - 17 working days

Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing technologies, techniques, applications, and opportunities. Under the editorial guidance of Hassan Karimi, with contributions from experts in the field, the book examines the breadth and depth of advanced LBS technologies and techniques. The book provides up-to-date information on LBSs, including WiFi fingerprinting, geo-crowdsouring, and location privacy as well as application areas such as LBSs for public health, indoor navigation, pedestrian navigation, and advertising. Highlights include discussions of Location-Based Social Networking (LBSN) and the latest developments in geospatial clouds and how they can be used. It takes a look into the future with coverage of emerging technologies that will shape the future generation of LBSs. Carefully designed to cover a range of topics for readers at different levels and with different backgrounds, the book provides a balance of knowledge between LBS theories, technologies, and applications. The caliber of the contributions coupled with the depth of coverage make the book an essential resource for anyone exploring the potential of the latest developments in LBSs.

CompTIA Network+ Deluxe Study Guide w Online Lab - Exam N10-008 5e (Hardcover, 5th Edition): T Lammle CompTIA Network+ Deluxe Study Guide w Online Lab - Exam N10-008 5e (Hardcover, 5th Edition)
T Lammle
R2,514 Discovery Miles 25 140 Ships in 12 - 17 working days

Expert Network+ Exam N10-008 preparation Now with 33 Online Lab Modules CompTIA Network+ Deluxe Study Guide, Fifth Edition, is your one-stop resource for the ultimate in exam preparation. Featuring 100 percent coverage of Exam N10-008 objectives, this book walks you through the essentials of network technologies, installation, configuration, media, topologies, security, and more. Networking guru Todd Lammle draws from over 30 years of networking experience to explain key topics, backed by practical examples and real-world insights relevant to what you'll face on the job. Written in accessible terms, this Sybex Deluxe Study Guide covers 100% of exam objectives and gets you ready for: Establishing network connectivity by deploying wired and wireless devices Understanding and maintaining network documentation Understanding the purpose of network services Understanding basic datacenter, cloud, and virtual networking concepts Monitoring network activity, and identifying performance and availability issues Implementing network hardening techniques Managing, configuring, and troubleshooting network infrastructure Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: Interactive test bank with 6 practice exams to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you???re ready to take the certification exam. Over 300 electronic flashcards to reinforce learning and last-minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared ABOUT THE PRACTICE LABS NETWORK+ LABS So you can practice with hands-on learning in a real environment, Sybex has bundled Practice Labs virtual labs that run from your browser. The registration code is included with the book and gives you 6 months unlimited access to Practice Labs CompTIA Network+ Exam N10-008 Labs with 33 unique lab modules to practice your skills.

Genocide Matters - Ongoing Issues and Emerging Perspectives (Hardcover, New): Joyce Apsel, Ernesto Verdeja Genocide Matters - Ongoing Issues and Emerging Perspectives (Hardcover, New)
Joyce Apsel, Ernesto Verdeja
R4,593 Discovery Miles 45 930 Ships in 12 - 17 working days

This edited book provides an interdisciplinary overview of recent scholarship in the field of genocide studies. The book examines four main areas: The current state of research on genocide New thinking on the categories and methods of mass violence Developments in teaching about genocide Critical analyses of military humanitarian interventions and post-violence justice and reconciliation The combination of critical scholarship and innovative approaches to familiar subjects makes this essential reading for all students and scholars in the field of genocide studies.

Genocide Matters - Ongoing Issues and Emerging Perspectives (Paperback, New): Joyce Apsel, Ernesto Verdeja Genocide Matters - Ongoing Issues and Emerging Perspectives (Paperback, New)
Joyce Apsel, Ernesto Verdeja
R1,410 Discovery Miles 14 100 Ships in 12 - 17 working days

This edited book provides an interdisciplinary overview of recent scholarship in the field of genocide studies. The book examines four main areas: The current state of research on genocide New thinking on the categories and methods of mass violence Developments in teaching about genocide Critical analyses of military humanitarian interventions and post-violence justice and reconciliation The combination of critical scholarship and innovative approaches to familiar subjects makes this essential reading for all students and scholars in the field of genocide studies.

Random Dynamical Systems in Finance (Hardcover, New): Anatoliy Swishchuk, Shafiqul Islam Random Dynamical Systems in Finance (Hardcover, New)
Anatoliy Swishchuk, Shafiqul Islam
R4,150 Discovery Miles 41 500 Ships in 12 - 17 working days

The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely focus on RDS in finance and economics. Exploring this emerging area, Random Dynamical Systems in Finance shows how to model RDS in financial applications.

Through numerous examples, the book explains how the theory of RDS can describe the asymptotic and qualitative behavior of systems of random and stochastic differential/difference equations in terms of stability, invariant manifolds, and attractors. The authors present many models of RDS and develop techniques for implementing RDS as approximations to financial models and option pricing formulas. For example, they approximate geometric Markov renewal processes in ergodic, merged, double-averaged, diffusion, normal deviation, and Poisson cases and apply the obtained results to option pricing formulas.

With references at the end of each chapter, this book provides a variety of RDS for approximating financial models, presents numerous option pricing formulas for these models, and studies the stability and optimal control of RDS. The book is useful for researchers, academics, and graduate students in RDS and mathematical finance as well as practitioners working in the financial industry.

Unit and Ubiquitous Internet of Things (Hardcover, New): Huansheng Ning Unit and Ubiquitous Internet of Things (Hardcover, New)
Huansheng Ning
R3,102 Discovery Miles 31 020 Ships in 12 - 17 working days

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts. Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous Internet of Things introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and the cyber world. It addresses key issues such as strategy and education, particularly around unit and ubiquitous IoT technologies. Supplying a new perspective on IoT, the book covers emerging trends and presents the latest progress in the field. It also: Outlines a fundamental architecture for future IoT together with the IoT layered model Describes various topological structures, existence forms, and corresponding logical relationships Establishes an IoT technology system based on the knowledge of IoT scientific problems Provides an overview of the core technologies, including basic connotation, development status, and open challenges The book examines ubiquitous sensing, networking, and communications, as well as information management involved in unit IoT. It describes global IoT applications and includes coverage of ubiquitous, local, industrial, national, and transnational IoT. Presenting detailed case studies that illustrate various application scenarios, the text considers the main IoT supporting technologies including resource management, loop control in actuation, session management, space-time consistency, security and privacy, energy management, spectrum management, nanotechnology, quantum technology, and big data.

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
KD Mitnick
R378 R259 Discovery Miles 2 590 Save R119 (31%) Ships in 12 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Parallel Programming for Modern High Performance Computing Systems (Paperback): Pawel Czarnul Parallel Programming for Modern High Performance Computing Systems (Paperback)
Pawel Czarnul
R1,441 Discovery Miles 14 410 Ships in 12 - 17 working days

In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems. This book covers the scope of parallel programming for modern high performance computing systems. It first discusses selected and popular state-of-the-art computing devices and systems available today, These include multicore CPUs, manycore (co)processors, such as Intel Xeon Phi, accelerators, such as GPUs, and clusters, as well as programming models supported on these platforms. It next introduces parallelization through important programming paradigms, such as master-slave, geometric Single Program Multiple Data (SPMD) and divide-and-conquer. The practical and useful elements of the most popular and important APIs for programming parallel HPC systems are discussed, including MPI, OpenMP, Pthreads, CUDA, OpenCL, and OpenACC. It also demonstrates, through selected code listings, how selected APIs can be used to implement important programming paradigms. Furthermore, it shows how the codes can be compiled and executed in a Linux environment. The book also presents hybrid codes that integrate selected APIs for potentially multi-level parallelization and utilization of heterogeneous resources, and it shows how to use modern elements of these APIs. Selected optimization techniques are also included, such as overlapping communication and computations implemented using various APIs. Features: Discusses the popular and currently available computing devices and cluster systems Includes typical paradigms used in parallel programs Explores popular APIs for programming parallel applications Provides code templates that can be used for implementation of paradigms Provides hybrid code examples allowing multi-level parallelization Covers the optimization of parallel programs

Official (ISC)2 Guide to the CAP CBK (Hardcover, 2nd edition): Patrick D. Howard Official (ISC)2 Guide to the CAP CBK (Hardcover, 2nd edition)
Patrick D. Howard
R2,190 Discovery Miles 21 900 Ships in 9 - 15 working days

Significant developments since the publication of its bestselling predecessor, "Building and Implementing a Security Certification and Accreditation Program, "warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP(r)) Common Body of Knowledge (CBK(r)) and NIST SP 800-37, the Official (ISC)2(r) Guide to the CAP(r) CBK(r), Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes.
Derived from the author s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book:

  • Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria
  • Explains how to combine disparate processes into a unified risk management methodology
  • Covers all the topics included in the Certified Authorization Professional (CAP(r)) Common Body of Knowledge (CBK(r))
  • Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS
  • Reviews the tasks involved in certifying and accrediting U.S. government information systems

Chapters 1 through 7 describe each of the domains of the (ISC)2(r) CAP(r) CBK(r). This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your I

The Internet of Mechanical Things - The IoT Framework for Mechanical Engineers (Hardcover): Sami Salama Hussen Hajjaj, Kisheen... The Internet of Mechanical Things - The IoT Framework for Mechanical Engineers (Hardcover)
Sami Salama Hussen Hajjaj, Kisheen Rao Gsangaya
R2,543 R2,291 Discovery Miles 22 910 Save R252 (10%) Ships in 9 - 15 working days

This book provides knowledge, skills, and strategies an engineer requires to effectively integrate Internet of Things (IoT) into the field of mechanical engineering. Divided into three sections named IoT Strategies, IoT Foundation topics, and IoT system development, the volume covers introduction to IoT framework, its components, advantages, challenges, and practical process for effective implementation of IoT from mechanical engineering perspective. Further, it explains IoT systems and hands-on training modules, implementation, and execution of IoT Systems. Features: Presents exclusive material on application of IoT in mechanical engineering. Combines theory and practice including relevant terminologies and hands-on. Emphasis on use of IoT to streamline operations, reduce costs, and increased profits. Focusses on development and implementation of Raspberry Pi and Arduino based IoT systems. Illustrates use IoT data to improve performance of robots, machines, and systems. This book aims at Researchers, Graduate students in Mechanical Engineering, Computer Programming, Automobile, Robotics, and Industry 4.0/automation.

Antiterrorism and Threat Response - Planning and Implementation (Hardcover, New): Ross Johnson Antiterrorism and Threat Response - Planning and Implementation (Hardcover, New)
Ross Johnson
R4,154 Discovery Miles 41 540 Ships in 12 - 17 working days

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,198 Discovery Miles 11 980
Introduction to Networking Basics
Patrick Ciccarelli, Christina Faulkner, … Paperback R2,320 R387 Discovery Miles 3 870
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,421 Discovery Miles 14 210
Security Engineering - A Guide to…
R. Anderson Hardcover R1,358 Discovery Miles 13 580
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Linux Command Line and Shell Scripting…
R. Blum Paperback R980 Discovery Miles 9 800
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850

 

Partners