0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (319)
  • R250 - R500 (924)
  • R500+ (16,272)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Principles of Inductive Near Field Communications for Internet of Things (Hardcover): Johnson I. Agbinya Principles of Inductive Near Field Communications for Internet of Things (Hardcover)
Johnson I. Agbinya
R3,111 Discovery Miles 31 110 Ships in 12 - 17 working days

Near field communication devices and the emerging field of Internet of things require efficient short range communication techniques. Classical telecommunication theory however has so far focused on radiating electromagnetic signals which is more suited to terrestrial communication systems. Over the last decade however considerable research and applications of inductive methods have emerged as innovative approaches for secure short range communications by changing the paradigm of an established model of electromagnetic communications. We have witnessed the emergence of embedded inductive medical devices, magneto-inductive waveguides, inductive pots and cooking devices, magneto-inductive sensors, wireless power transfer, inductive hearing aids and the emerging inductive point-to-point communication specifically termed near-field communication (NFC) as used in mobile phones and payment cards to name a few. While there exist a large set of distributed methods and algorithms detailing the design and performances of such applications, a significant gap is observed as a lack of detailed collection of the methods in one place which could be easily understood and used quickly by someone seeking to apply the methods. In this book this missing gap is filled with the required details and the theory of near field communication systems including both the radiating and reactive (energy coupling) near-field systems in addition to the well known far field radiation techniques. The book details the fundamental expressions and design methods which facilitate the creation of near field devices and equipment including embedded biomedical implants. The book contains recent advances in inductive communications, performance, limitations and a collection of applications. It also lays a strong foundation for the application of inductive methods for creating Internet of Things systems. * The topics discussed in the book in great details include: * Near field and far field methods * Circuit models of inductive antennas; * Inductive methods in embedded medical devices * Range and capacity extension methods including multiple-input and multiple-output inductive systems; * Coding and modulation techniques; * Narrowband and broadband methods; * Magnetic link budgets; * Crosstalk * Magnetic induction waveguide devices and a Near field Simulator in Matlab The book is a compendium and design methods for inductive near field technologies and is ideal for design personnel in the wireless communication industries as well as academic staff and master/research students in computer science, wireless sensors, telecommunications systems research, electrical engineering and Internet of things. It is a useful guide for undergraduate student to appreciate the role of inductive circuits and magnetism in telecommunications and electronic devices in general.

Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New): Gilbert N. Sorebo, Michael C.... Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New)
Gilbert N. Sorebo, Michael C. Echols
R4,159 Discovery Miles 41 590 Ships in 12 - 17 working days

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security ExaminersFollowing an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission-the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations. The book explores future concepts-such as energy storage and the use of plug-in electric vehicles (PEVs)-in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection. Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere.

Delay Tolerant Networks - Protocols and Applications (Hardcover): Yan Zhang, Athanasios V Vasilakos, Thrasyvoulos Spyropoulos Delay Tolerant Networks - Protocols and Applications (Hardcover)
Yan Zhang, Athanasios V Vasilakos, Thrasyvoulos Spyropoulos
R4,014 Discovery Miles 40 140 Ships in 12 - 17 working days

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications.

Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. Written for a broad audience of researchers and practitioners, it supplies useful reference material for graduate students and senior undergraduate students in courses of networking, wireless, and mobile communications. Starting with an accessible introduction to DTNs, their architecture, bundle protocols, and routing schemes, the book provides authoritative coverage of:

  • DTN Routing
  • Energy-Aware Routing Protocol for DTNs
  • A Routing-Compatible Credit-Based Incentive Scheme
  • R-P2P: a Data-Centric Middleware for Delay Tolerant Applications
  • Mobile Peer-to-Peer Systems over DTNs
  • Delay-Tolerant Monitoring of Mobility-Assisted WSN
  • Message Dissemination in Vehicular Networks
  • DTN Protocols for Space Communications
  • DTN for Satellite Communications

Reporting on the latest developments in these domains, the distinguished panel of contributors supplies a realistic look into the future of networking. Complete with sections that summarize open issues in each domain, this book arms you with the understanding and methods required to make an impact on the advancement of these emerging networks that continue to grow in importance.

Social Software Engineering - Development and Collaboration with Social Networking (Hardcover): Jessica Keyes Social Software Engineering - Development and Collaboration with Social Networking (Hardcover)
Jessica Keyes
R3,734 Discovery Miles 37 340 Ships in 12 - 17 working days

Although the precepts of software engineering have been around for decades, the field has failed to keep pace with rapid advancements in computer hardware and software. Modern systems that integrate multiple platforms and architectures, along with the collaborative nature of users who expect an instantaneous global reach via the Internet, require updated software engineering methods.

Social Software Engineering: Development and Collaboration with Social Networking examines the field through the spectrum of the social activities that now compose it. Supplying an up-to-date look at this ever-evolving field, it provides comprehensive coverage that includes security, legal, and privacy issues in addition to workflow and people issues.

Jessica Keyes, former managing director of R&D for the New York Stock Exchange and noted columnist, correspondent, and author with more than 200 articles published, details the methodology needed to bring mission-critical software projects to successful conclusions. She provides readers with the understanding and tools required to fuse psychology, sociology, mathematics, and the principles of knowledge engineering to develop infrastructures capable of supporting the collaborative applications that today's users require.

Near Field Communications Handbook (Hardcover): Syed A. Ahson, Mohammad Ilyas Near Field Communications Handbook (Hardcover)
Syed A. Ahson, Mohammad Ilyas
R4,316 Discovery Miles 43 160 Ships in 12 - 17 working days

From basic concepts to research grade material and future directions, the Near Field Communications Handbook provides comprehensive technical coverage of this rapidly emerging field. Walking readers through emerging applications, it offers a glimpse at a future in which near field communication (NFC) technology is fully integrated into daily life. Containing cutting-edge contributions from 50 experts from around the world, the book covers the range of topics related to NFC. It begins with an overview of the basics in digital, biometric, and mobile identity and security. Next, it reviews NFC applications with an all-in-one device and provides detailed guidelines for designing NFC applications with high levels of acceptance in consumer markets. Investigates the role of NFC in the development of pervasive universities and ubiquitous cities Examines privacy-preserving receipt management with NFC phones-proposing a policy-based approach for managing user transaction history Considers the empirically grounded design of a nutrition tracking system for patients with eating disorders Compares the performance of four traditional mobile payment service concepts The handbook includes coverage of the StoLPAN Consortium and its contribution to industry progress, as well as the use of RFID/NFC for pervasive serious games. Capturing the state-of-the-art in NFC technology, this reference provides you with ready access to the information required to advance the field. Its well-illustrated and organized structure also makes it suitable as a text for graduate-level and research-oriented courses dealing with NFC.

Information Security Management Handbook, Volume 5 (Hardcover, 6th edition): Micki Krause Nozaki, Harold F. Tipton Information Security Management Handbook, Volume 5 (Hardcover, 6th edition)
Micki Krause Nozaki, Harold F. Tipton
R4,341 Discovery Miles 43 410 Ships in 12 - 17 working days

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.

Building Enterprise Systems with ODP - An Introduction to Open Distributed Processing (Hardcover): Peter F Linington, Zoran... Building Enterprise Systems with ODP - An Introduction to Open Distributed Processing (Hardcover)
Peter F Linington, Zoran Milosevic, Akira Tanaka, Antonio Vallecillo
R2,358 Discovery Miles 23 580 Ships in 12 - 17 working days

The Reference Model of Open Distributed Processing (RM-ODP) is an international standard that provides a solid basis for describing and building widely distributed systems and applications in a systematic way. It stresses the need to build these systems with evolution in mind by identifying the concerns of major stakeholders and then expressing the design as a series of linked viewpoints. Although RM-ODP has been a standard for more than ten years, many practitioners are still unaware of it. Building Enterprise Systems with ODP: An Introduction to Open Distributed Processing offers a gentle pathway to the essential ideas that constitute ODP and shows how these ideas can be applied when designing and building challenging systems. It provides an accessible introduction to the design principles for software engineers and enterprise architects. The book also explains the benefits of using viewpoints to produce simpler and more flexible designs and how ODP can be applied to service engineering, open enterprise, and cloud computing. The authors include guidelines for using the Unified Modeling Language (TM) (UML) notation and for structuring and writing system specifications. They elucidate how this fits into the model-driven engineering tool chain via approaches, such as Model-Driven Architecture (R) (MDA). They also demonstrate the power of RM-ODP for the design and organization of complex distributed IT systems in e-government, e-health, and energy and transportation industries. All concepts and ideas in the book are illustrated through a single running example that describes the IT support needed by a medium-sized company as it grows and develops. Complete UML models and more are available at http://theodpbook.lcc.uma.es/

Packet Forwarding Technologies (Paperback): Weidong Wu Packet Forwarding Technologies (Paperback)
Weidong Wu
R1,771 Discovery Miles 17 710 Ships in 12 - 17 working days

As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities. The first book to explore this subject, Packet Forwarding Technologies explains in depth packet forwarding concepts and implementation technologies. It covers the data structures, algorithms, and architectures used to implement high-speed routers. Following an introduction to the architecture of IP routers, the author discusses how IP address lookup is one of the major bottlenecks in high-performance routers. He describes the characteristics of a routing table and addresses the difficulty of the longest-matching prefix search. The remainder of the book deals with fast IP address lookup. Coverage includes the various available architectures, data structures, and algorithms based on software and hardware as well as detailed discussions on state-of-the-art innovations. With many illustrations, tables, and simulations, this practical guide to packet forwarding technologies facilitates understanding of IP routers and the latest router designs.

Mobile Wimax - Toward Broadband Wireless Metropolitan Area Networks (Paperback): Yan Zhang, Hsiao--Hwa Chen Mobile Wimax - Toward Broadband Wireless Metropolitan Area Networks (Paperback)
Yan Zhang, Hsiao--Hwa Chen
R1,772 Discovery Miles 17 720 Ships in 12 - 17 working days

The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides high-speed, high-bandwidth efficiency and high-capacity multimedia services for both residential and enterprise applications. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks examines the basic concepts, recent advances, and latest standard specifications pertinent to WirelessMANs, placing emphasis on IEEE 802.16-based WiMAX. After introducing the basics of WirelessMAN, the book addresses topics in three accessible parts. The first part focuses on radio frequency (RF), signal processing, multiple in-multiple out (MIMO) technology, and identifying challenges and possible solutions in the physical layer. An examination of protocol issues follows, including those involving medium access control (MAC), quality of service (QoS) in point-to-multi-point (PMP) and mesh networks, cross layer optimization, mobility management, handoff in heterogeneous networks, energy management, and link adaptation mechanisms. The final part considers issues regarding security, economy, and system capacity in the WiMAX. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks is an important resource for those interested in understanding all aspects relevant to the technical, practical, economic, and policy issues concerning WirelessMANs. It offers comprehensive practical and technical guidance on the fundamentals and recent advances in general WirelessMAN, as well as the latest standard specifications in IEEE 802.16a/c/d/e families.

Spatial Decision Support Systems - Principles and Practices (Paperback): Ramanathan Sugumaran, John Degroote Spatial Decision Support Systems - Principles and Practices (Paperback)
Ramanathan Sugumaran, John Degroote
R1,741 Discovery Miles 17 410 Ships in 12 - 17 working days

Although interest in Spatial Decision Support Systems (SDSS) continues to grow rapidly in a wide range of disciplines, students, planners, managers, and the research community have lacked a book that covers the fundamentals of SDSS along with the advanced design concepts required for building SDSS. Filling this need, Spatial Decision Support Systems: Principles and Practices provides a comprehensive examination of the various aspects of SDSS evolution, components, architecture, and implementation. It integrates research from a variety of disciplines, including the geosciences, to supply a complete overview of SDSS technologies and their application from an interdisciplinary perspective. This groundbreaking reference provides thorough coverage of the roots of SDSS. It explains the core principles of SDSS, how to use them in various decision making contexts, and how to design and develop them using readily available enabling technologies and commercial tools. The book consists of four major parts, each addressing different topic areas in SDSS: Presents an introduction to SDSS and the evolution of SDSS Covers the essential and optional components of SDSS Focuses on the design and implementation of SDSS Reviews SDSS applications from various domains and disciplines-investigating current challenges and future directions The text includes numerous detailed case studies, example applications, and methods for tailoring SDSS to your work environment. It also integrates sample code segments throughout. Addressing the technical and organizational challenges that affect the success or failure of SDSS, the book concludes by considering future directions of this rapidly emerging field of study.

Cloud and Virtual Data Storage Networking (Hardcover): Greg Schulz Cloud and Virtual Data Storage Networking (Hardcover)
Greg Schulz
R3,704 Discovery Miles 37 040 Ships in 12 - 17 working days

The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down or information recession. Instead, the need to process, move, and store data has only increased. Consequently, IT organizations are looking to do more with what they have while supporting growth along with new services without compromising on cost and service delivery.

Cloud and Virtual Data Storage Networking, by savvy IT industry veteran Greg Schulz, looks at converging IT resources and management technologies for facilitating efficient and effective delivery of information services, including enabling of Information Factories. Regardless of your experience level, Schulz guides you through the various technologies and techniques available for achieving efficient information services delivery. Coverage includes:

  • Information services delivery model options and best practices
  • Metrics for efficient E2E IT management
  • Server, storage, I/O networking, and data center virtualization
  • Converged and cloud storage services (IaaS, PaaS, SaaS)
  • Data protection for virtual, cloud, and physical environments
  • Data footprint reduction and data protection modernization
  • High availability, business continuance, and disaster recovery

This much-needed reference brings together technology themes and topics that are converging in IT and data center environments for enabling effective information services, in a practical and hype-free manner. When it comes to IT clouds and virtualization, you must look before you leap. This book will help you address the questions of when, where, with what, and how to leverage cloud, virtual, and data storage networking as part of your IT infrastructure.

A video of Greg Schulz discussing his new book is featured on the CRC Press YouTube channel.

Visit Slideshare to view a slide presentation based on the book.

Lattice Basis Reduction - An Introduction to the LLL Algorithm and Its Applications (Hardcover, New): Murray R. Bremner Lattice Basis Reduction - An Introduction to the LLL Algorithm and Its Applications (Hardcover, New)
Murray R. Bremner
R3,412 Discovery Miles 34 120 Ships in 12 - 17 working days

First developed in the early 1980s by Lenstra, Lenstra, and Lov sz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an introduction to the theory and applications of lattice basis reduction and the LLL algorithm. With numerous examples and suggested exercises, the text discusses various applications of lattice basis reduction to cryptography, number theory, polynomial factorization, and matrix canonical forms.

Slack For Dummies (Paperback): P. Simon Slack For Dummies (Paperback)
P. Simon
R498 Discovery Miles 4 980 Ships in 12 - 17 working days

You get so much more done when you Slack! Ever wondered what it would be like to be less overwhelmed, more efficient, and much more engaged at work? A way you can make all that happen is, of course, to Slack. Actually, it's to use Slack, the business communications platform that's revolutionized how groups work together. This comprehensive guide shows how--as well as why--there are now millions of users of this flexible, fun, and intuitive workspace tool. Presented in a clear, easy-to-follow style, Slack For Dummies takes you from the basics of getting started with the service all the way through how to get your teams Slacking together for all they're worth. You'll also find case studies showing how Slack increases productivity and how to replicate that in your organization, as well as tips on getting buy-in from the boss. Introduce Slack to your workflo wUnderstand roles and feature sAnalyze user dat aKeep your Slacking secure So, take a peek inside and discover how you can cut the slack using Slack--and clue your teams in on how there is actually a way to Slack off for improved results!

Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New): Jesus Mena Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New)
Jesus Mena
R3,714 Discovery Miles 37 140 Ships in 12 - 17 working days

Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data. To combat this unlawful activity, knowledge about the use of machine learning technology and software is critical. Machine Learning Forensics for Law Enforcement, Security, and Intelligence integrates an assortment of deductive and instructive tools, techniques, and technologies to arm professionals with the tools they need to be prepared and stay ahead of the game.

Step-by-step instructions

The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text extraction, and rule generating software to "interrogate the evidence." This powerful data is indispensable for fraud detection, cybersecurity, competitive counterintelligence, and corporate and litigation investigations. The book also provides step-by-step instructions on how to construct adaptive criminal and fraud detection systems for organizations.

Prediction is the key

Internet activity, email, and wireless communications can be captured, modeled, and deployed in order to anticipate potential cyber attacks and other types of crimes. The successful prediction of human reactions and server actions by quantifying their behaviors is invaluable for pre-empting criminal activity. This volume assists chief information officers, law enforcement personnel, legal and IT professionals, investigators, and competitive intelligence analysts in the strategic planning needed to recognize the patterns of criminal activities in order to predict when and where crimes and intrusions are likely to take place.

Game Theory for Wireless Communications and Networking (Hardcover): Yan Zhang, Mohsen Guizani Game Theory for Wireless Communications and Networking (Hardcover)
Yan Zhang, Mohsen Guizani
R4,047 Discovery Miles 40 470 Ships in 12 - 17 working days

Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applications. It describes how to employ game theory in infrastructure-based wireless networks and multihop networks to reduce power consumption-while improving system capacity, decreasing packet loss, and enhancing network resilience. Providing for complete cross-referencing, the text is organized into four parts: Fundamentals-introduces the fundamental issues and solutions in applying different games in different wireless domains, including wireless sensor networks, vehicular networks, and OFDM-based wireless systems Power Control Games-considers issues and solutions in power control games Economic Approaches-reviews applications of different economic approaches, including bargaining and auction-based approaches Resource Management-explores how to use the game theoretic approach to address radio resource management issues The book explains how to apply the game theoretic model to address specific issues, including resource allocation, congestion control, attacks, routing, energy management, packet forwarding, and MAC. Facilitating quick and easy reference to related optimization and algorithm methodologies, it supplies you with the background and tools required to use game theory to drive the improvement and development

Security+ Guide to Network Security Fundamentals, International Edition (Paperback, International Edition): Mark Ciampa Security+ Guide to Network Security Fundamentals, International Edition (Paperback, International Edition)
Mark Ciampa
R1,437 R1,233 Discovery Miles 12 330 Save R204 (14%) Ships in 10 - 15 working days

Reflecting the latest trends and developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, International Edition, provides a complete introduction to practical network and computer security and maps to the CompTIA Security+ SY0-301 Certification Exam. The text covers the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and, cryptography. This updated edition includes new topics, such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. This new edition features activities that link to the Information Security Community Site, which offers video lectures, podcats, discussion boards, additional hands-on activities and more to provide a wealth of resources and up-to-the minute information.

Architecture for the Commons - Participatory Systems in the Age of Platforms (Hardcover): Jose Sanchez Architecture for the Commons - Participatory Systems in the Age of Platforms (Hardcover)
Jose Sanchez
R4,131 Discovery Miles 41 310 Ships in 12 - 17 working days

Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.

Dynamic Games for Network Security (Paperback, 1st ed. 2018): Xiaofan He, Huaiyu Dai Dynamic Games for Network Security (Paperback, 1st ed. 2018)
Xiaofan He, Huaiyu Dai
R1,579 R1,422 Discovery Miles 14 220 Save R157 (10%) Ships in 12 - 17 working days

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

MOOC Learning Platform Development (Hardcover): Varun Gupta, Durg Singh Chauhan, Thomas Hanne MOOC Learning Platform Development (Hardcover)
Varun Gupta, Durg Singh Chauhan, Thomas Hanne
R1,660 Discovery Miles 16 600 Ships in 12 - 17 working days

The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses. The book proposes a flexible online platform. This solution provides flexibility in distance learning processes including course enrollment, learning, evaluation, and outcome of degrees. The proposed system not only gives students freedom to choose their courses in accordance with their needs but also use earned credit towards online degrees of any university of their choice.

Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Paperback):... Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Paperback)
Titus De Silva
R2,281 Discovery Miles 22 810 Ships in 12 - 17 working days

Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.

Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Hardcover):... Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Hardcover)
Titus De Silva
R4,219 Discovery Miles 42 190 Ships in 12 - 17 working days

Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.

Data Mining and Machine Learning in Cybersecurity (Hardcover): Sumeet Dua, Xian Du Data Mining and Machine Learning in Cybersecurity (Hardcover)
Sumeet Dua, Xian Du
R2,643 Discovery Miles 26 430 Ships in 12 - 17 working days

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges-detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Testing Code Security (Paperback): Maura A. van der Linden Testing Code Security (Paperback)
Maura A. van der Linden
R1,814 Discovery Miles 18 140 Ships in 12 - 17 working days

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition): Angel R. Otero Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition)
Angel R. Otero
R1,422 Discovery Miles 14 220 Ships in 12 - 17 working days

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.

Security Patch Management (Hardcover): Felicia Nicastro Security Patch Management (Hardcover)
Felicia Nicastro
R2,657 Discovery Miles 26 570 Ships in 12 - 17 working days

Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task. Effective patch management is not about technology; it's about having a formal process in place that can deploy patches to vulnerable systems quickly. Helping you figure out exactly what to patch and which patches to use, Security Patch Management provides detailed guidance through the process of creating and implementing an effective and efficient patch management process. It uses a format that is easy-to-understand and applicable regardless of the operating system, network device, or patch deployment tool. The author illustrates the proper implementation of patches on devices and systems within various infrastructures to provide the insight required to: Design your own patch release process and keep it action ready Test the effectiveness of your patches Keep up with the latest patch releases Prioritize the vulnerabilities that need to be addressed Apply patches quickly and without draining essential network resources This book supplies the tools and guidelines you need to stay one step ahead of the exploits on the horizon. It will help you establish a patch management process that not only protects your organization against zero-day attacks, but also helps you become more proactive when it comes to this critical facet of information security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,421 Discovery Miles 14 210
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Principles of Information Security
Herbert Mattord, Michael Whitman Paperback R1,358 R1,172 Discovery Miles 11 720
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,225 Discovery Miles 12 250
77-423 Microsoft Outlook 2013
Microsoft Official Academic Course Paperback R2,940 R481 Discovery Miles 4 810
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,198 Discovery Miles 11 980
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners