0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (322)
  • R250 - R500 (918)
  • R500+ (16,250)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Business Data Communications and Networking, 13th EMEA Edition (Paperback, 13th Edition, Emea Edition): J. Fitzgerald Business Data Communications and Networking, 13th EMEA Edition (Paperback, 13th Edition, Emea Edition)
J. Fitzgerald
R1,337 Discovery Miles 13 370 Out of stock

As the world grows increasingly interconnected, data communications has become a critical aspect of business operations. Wireless and mobile technology allows us to seamlessly transition from work to play and back again, and the Internet of things has brought our appliances, vehicles, and homes into the network; as life increasingly takes place online, businesses recognize the opportunity for a competitive advantage. Today's networking professionals have become central to nearly every aspect of business, and this book provides the essential foundation needed to build and manage the scalable, mobile, secure networks these businesses require. Although the technologies evolve rapidly, the underlying concepts are more constant. This book combines the foundational concepts with practical exercises to provide a well-grounded approach to networking in business today. Key management and technical issues are highlighted and discussed in the context of real-world applications, and hands-on exercises reinforce critical concepts while providing insight into day-to-day operations. Detailed technical descriptions reveal the tradeoffs not presented in product summaries, building the analytical capacity needed to understand, evaluate, and compare current and future technologies.

Strategic Information Management - Theory and Practice (Hardcover, 5th edition): Robert D. Galliers, Dorothy E. Leidner, Boyka... Strategic Information Management - Theory and Practice (Hardcover, 5th edition)
Robert D. Galliers, Dorothy E. Leidner, Boyka Simeonova
R4,182 Discovery Miles 41 820 Ships in 12 - 17 working days

Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it. Modern IT is key to organizational performance; yet we often assume the benefits will occur without forethought or effort. As managerial tasks become more complex, so the nature of the required information systems changes - from structured, routine support to ad hoc, unstructured, complex enquiries at the highest levels of management. If taken for granted, serious implications can arise for organizations. This fifth edition of Strategic Information Management has been brought fully up to date with recent developments in the management of information systems, including digital transformation strategy, the issues surrounding big data and algorithmic decision-making. The book provides a rich source of material reflecting recent thinking on the key issues facing executives, drawing from a wide range of contemporary articles written by leading experts in North America, Europe, and Australia. Combining theory with practice, each section is fully introduced, includes further reading and questions for further discussion. Designed for MBA, master's level students, and advanced undergraduate students taking courses in information systems management, it also provides a wealth of information and references for researchers.

Inclusive Development of Society - Proceedings of the 6th International Conference on Management and Technology in Knowledge,... Inclusive Development of Society - Proceedings of the 6th International Conference on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018) (Hardcover)
Natalia Filimonova, Irina Frolova, Ford Lumban Gaol, Ignatova Vladimirovna
R5,355 Discovery Miles 53 550 Ships in 12 - 17 working days

Inclusive Development of Society contains papers that were originally presented at the 2018 International Congress on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018), held 6-7 October and 15-16 December 2018 in Kuta, Bali, Indonesia and 18-19 October, 2018 at The Southern Federal University, Rostov-on-don, Russia. The contributions deal with various interdisciplinary research topics, particularly in the fields of social sciences, economics and the arts. The papers focus especially on such topics as language, cultural studies, economics, behavior studies, political sciences, media and communication, psychology and human development. The theoretical research studies included here should provide a solid foundation for the development of new tools that explore the possibilities of developing tourism, hospitality, service industries in Knowledge Economic Era, and the empirical papers will advance our knowledge regarding the impact of information technologies in organizations' and institutions' practices. These proceedings should be of interest to academics and professionals in the wider field of social sciences, including disciplines such as education, psychology, tourism and knowledge management.

Information Security Management - Concepts and Practice (Hardcover): Bel G. Raggad Information Security Management - Concepts and Practice (Hardcover)
Bel G. Raggad
R2,986 Discovery Miles 29 860 Ships in 9 - 15 working days

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.

An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment?including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,562 Discovery Miles 35 620 Ships in 12 - 17 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Colonialism and the Modernist Moment in the Early Novels of Jean Rhys (Paperback, New): Carol Dell'Amico Colonialism and the Modernist Moment in the Early Novels of Jean Rhys (Paperback, New)
Carol Dell'Amico
R1,138 R771 Discovery Miles 7 710 Save R367 (32%) Ships in 12 - 17 working days

Colonialism and the Modernist Moment in the Early Novels of Jean Rhys explores the postcolonial significance of Rhys s modernist period work, which depicts an urban scene more varied than that found in other canonical representations of the period. Arguing against the view that Rhys comes into her own as a colonial thinker only in the post-WWII period of her career, this study examines the austere insights gained by Rhys s active cultivation of her fringe status vis-a-vis British social life and artistic circles, where her sharp study of the aporias of marginal lives and the violence of imperial ideology is distilled into an artistic statement positing the outcome of the imperial venture as a state of homelessness across the board, for colonized and metropolitans alike. Bringing to view heretofore overlooked emigre populations, or their children, alongside locals, Rhys s urbanites struggle to construct secure lives not simply as a consequence of commodification, alienation, or voluntary expatriation, but also as a consequence of marginalization and migration. This view of Rhys s early work asserts its vital importance to postcolonial studies, an importance that has been overlooked owing to an over hasty critical consensus that only one of her early novels contains significant colonial content. Yet, as this study demonstrates, proper consideration of colonial elements long considered only incidental illuminates a colonial continuum in Rhys s work from her earliest publications. "

Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover): J. M. Pierson Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover)
J. M. Pierson
R2,771 Discovery Miles 27 710 Ships in 12 - 17 working days

Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. Discusses measurement and modeling of the energy consumption method Includes methods for energy consumption reduction in diverse computing environments Features a variety of case studies and examples of energy reduction and assessment Timely and important, Large-Scale Distributed Systems and Energy Efficiency is an invaluable resource for ways of increasing the energy efficiency of computing systems and networks while simultaneously reducing the carbon footprint.

RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Hardcover): Yan Zhang, Laurence T. Yang,... RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Hardcover)
Yan Zhang, Laurence T. Yang, Jiming Chen
R5,826 Discovery Miles 58 260 Ships in 12 - 17 working days

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for a resource that brings together timely coverage of RFIS, Sensor Networks, and their integration.

Filling this need, RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insights into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples.

This forward looking resource details the enhanced visibility and monitoring capabilities that are possible with RFID and WSNs and highlights contemporary applications including smart homes, surveillance systems, and personal health care. Providing a complete understanding of the essential fundamentals behind RFID and WSNs, this book will help you foster the skills needed to materialize the enhancements possible when these two promising technologies are used together.

Managing Web Projects (Hardcover): Edward B. Farkas Managing Web Projects (Hardcover)
Edward B. Farkas
R5,815 Discovery Miles 58 150 Ships in 12 - 17 working days

Getting Web projects done right and delivered on time is all about efficiency. Putting the information you need and tools you can rely on at your ready disposal Managing Web Projects is a complete guide for project managers in the Internetworking industry. Whether you are a Web developer or an Internet Service Provider, whether your project is a quick fix, a complete overhaul, or a new start-up, this resource provides you with an organized path. It will walk you through a typical project life cycle, while providing you with all the tools and definitions needed to take charge and instill confidence in your staff and your customers.

Invaluable for those seeking ISO 9001 certification, the text includes a number of detailed Work Instructions that can be used to develop a formal quality management system specific to a project management organization. They can also be leveraged in a TQM (Total Quality Management) or a Six Sigma environment. The book includes:

  • Management guidelines for web hosting, data center migrations, site security, content development, application and Web site loading and testing, VPNs, VoIP, business continuity, and disaster recovery
  • An Internet project management glossary, a technical Internetworking glossary, and a project management acronym table
  • A tools suite with a proven record of success for project initiation, planning, execution, control, and close out

This complete resource provides the resources needed including dozens of time-tested templates, schedules, checklists, and flow charts to become fully versed in and aligned with the nine knowledge areas and five major processes codified by the Project Management Body of Knowledge (PMBOK ).

802.1X Port-Based Authentication (Paperback): Edwin Lyle Brown 802.1X Port-Based Authentication (Paperback)
Edwin Lyle Brown
R1,802 Discovery Miles 18 020 Ships in 12 - 17 working days

Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol.

Entity Authentication and Personal Privacy in Future Cellular Systems (Hardcover): Geir M. Koien Entity Authentication and Personal Privacy in Future Cellular Systems (Hardcover)
Geir M. Koien
R2,789 Discovery Miles 27 890 Ships in 12 - 17 working days

In the first quarter of 2009, there were more than 4 billion subscribers to cellular phone services in the world and this number is constantly growing. With this in mind it should be clear that use of mobile communication has already become both pervasive and ubiquitous. It has become a global commodity really. Entity Authentication and Personal Privacy in Future Cellular Systems aims at explaining and examining access security as it is found in mobile/cellular systems. A thorough investigation of how access security and personal privacy is handled in the 3GPP system is conducted. This includes both the 2G systems GSM/GPRS and the 3G system UMTS. The emerging fourth generation LTE architecture is also examined. The first part of the book deals exclusively with presenting access security as found in the 3GPP system. Particular attention is given to the authentication and key agreement procedures. The 3GPP systems have evolved and the access security architecture in LTE is substantially more advanced and mature than what you would find in GSM/GPRS, but even the LTE security architecture has its limitations. In part two of the book we go on to examine what is missing from the current cellular access security architectures. Some of the shortcomings found in GSM/GPRS and later UMTS have been partially addressed in LTE, but the burden of backwards compatibility has meant that many issues could not easily be resolved. Free from those restrictions, we shall see that one can provide substantially improved subscriber privacy and enhanced entity authentication, while also avoiding the delegated authentication control that all 3GPP systems have. The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.

Building an Enterprise-Wide Business Continuity Program (Hardcover): Kelley Okolita Building an Enterprise-Wide Business Continuity Program (Hardcover)
Kelley Okolita
R2,666 Discovery Miles 26 660 Ships in 12 - 17 working days

If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate? Would your staff? Would every person who works for your organization?

Increasing threats to business operations, both natural and man-made, mean a disaster could occur at any time. It is essential that corporations and institutions develop plans to ensure the preservation of business operations and the technology that supports them should risks become reality.

Building an Enterprise-Wide Business Continuity Program goes beyond theory to provide planners with actual tools needed to build a continuity program in any enterprise. Drawing on over two decades of experience creating continuity plans and exercising them in real recoveries, including 9/11 and Hurricane Katrina, Master Business Continuity Planner, Kelley Okolita, provides guidance on each step of the process. She details how to validate the plan and supplies time-tested tips for keeping the plan action-ready over the course of time.

Disasters can happen anywhere, anytime, and for any number of reasons. However, by proactively planning for such events, smart leaders can prepare their organizations to minimize tragic consequences and readily restore order with confidence in the face of such adversity.

Managing Security Overseas - Protecting Employees and Assets in Volatile Regions (Hardcover): Scott Alan Ast Managing Security Overseas - Protecting Employees and Assets in Volatile Regions (Hardcover)
Scott Alan Ast
R3,716 Discovery Miles 37 160 Ships in 12 - 17 working days

Threats to multinational corporations come in two forms: natural and man-made. This book illustrates the types of risks that confront corporations when working outside of North America. It provides key tools and understanding that are required to do business in a safe and secure manner, no matter the level of risk. It walks through a logical framework for safety and security program development from Day One. Using real-world case studies and examples, the book is a useful reference to security managers, security consultants, contractors, frequent global business travelers, and for those who are presently or soon-to-be assigned in overseas positions.

Virtualization and Private Cloud with VMware Cloud Suite (Hardcover): Lee Chao Virtualization and Private Cloud with VMware Cloud Suite (Hardcover)
Lee Chao
R3,731 Discovery Miles 37 310 Ships in 12 - 17 working days

To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic support from VMware, readers can use the VMware supported software to create various virtualized IT infrastructures sophisticated enough for various sized enterprises. Then, the virtualized IT infrastructure can be made available to an enterprise through the private cloud services.

Blockchain for Medical Research - Accelerating Trust in Healthcare (Hardcover): Yael Bizouati-Kennedy, Sean Manion Blockchain for Medical Research - Accelerating Trust in Healthcare (Hardcover)
Yael Bizouati-Kennedy, Sean Manion
R4,136 Discovery Miles 41 360 Ships in 12 - 17 working days

It takes 17 years on average to bring new medical treatments ideas into evidence-based clinical practice. The growing replicability crisis in science further delays these "new miracles." Blockchain can improve science and accelerate medical research while bringing a new layer of trust to healthcare. This book is about science, its value to medicine, and how we can use blockchain to improve the quality and impact of both. The book looks at science and medicine from an insider's perspective and describes the processes, successes, shortcomings and opportunities in an accessible way for a broad audience. It weaves this a non-technical look at the emerging world of blockchain technology; what it is, where it is useful, and how it can improve science and medicine. It lays out a roadmap for this application to transform how we develop knowledge about health and medicine to improve our lives. In the first part, Blockchain isn't Tech, the authors look at blockchain/distributed ledger technology along with critical trade-offs and current explorations of its utility. They give an overview of use cases for the technology across industries, including finance, manufacturing and healthcare, with interviews and insights from leaders across government, academia, and tech/health industry both big and start-up. In the second part, Science is Easy, the authors look at science as a process and how this drives advancement in medicine. They shed a light on some of science's shortcomings, including the reproducibility crisis and problems with misaligned incentives (i.e. publish or perish). They apply a breakdown of critical components to the functional steps in the scientific process and outline how the open science movement is looking to improve these, while highlighting the limit of these fixes with current technology, incentives and structure of science. In the third part, DAO of Science, the authors look at how blockchain applied to open science can impact medical research. They examine how this distributed approach can provide better quality science, value-based research and faster medical miracles. Finally, they provide a vision of the future of distributed medical research and give a roadmap of steps to get there.

IMS - A New Model for Blending Applications (Hardcover, New): Mark Wuthnow, Jerry Shih, Matthew Stafford IMS - A New Model for Blending Applications (Hardcover, New)
Mark Wuthnow, Jerry Shih, Matthew Stafford
R3,719 Discovery Miles 37 190 Ships in 12 - 17 working days

IP Multimedia Subsystem (IMS) technology, which merges the Internet with interactive telecommunications, represents the here and now for today 's packet-switched networks. Consequently, anyone working with or around these converging fields needs to possess a fundamental understanding of IMS and how this technology is poised to change the way new applications are designed and deployed.

IMS: A New Model for Blending Applications goes beyond most references in this field. Rather than offer the usual explanation of the standard itself, the authors address how IMS-based services might be deployed in an operator 's network. Leveraging the inside knowledge gained from years of working at the forefront of IMS research, the authors delineate the application layers and the applications that can be implemented using an IMS network. For those unfamiliar with IMS, they provide an overview of its key components and the signaling standards used for the implementation of an end-to-end IMS service.

Significant concepts are conveyed through real-life vignettes that describe how end users might actually use interactive IMS applications in the course of their day. This approach mimics the way an operator 's marketing organization might go about building a business case for IMS application deployment. While technical enough to meet the needs of engineers, this approach will greatly assist marketing, sales, and managerial professionals with gaining a basic understanding of IMS, as well as a sense of the numerous applications driving the field forward.

Information Security Management Handbook, Volume 3 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 3 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R4,307 Discovery Miles 43 070 Ships in 12 - 17 working days

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.

Captures the crucial elements of the CBK

Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.

Also available on CD-ROM

Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow's hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Paperback, 8th Edition): Mike Chapple,... (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Paperback, 8th Edition)
Mike Chapple, James Michael. Stewart, Darril Gibson
R1,761 R1,619 Discovery Miles 16 190 Save R142 (8%) Ships in 9 - 15 working days

NOTE: The CISSP objectives this book covered were issued in 2018. For coverage of the most recent CISSP objectives effective in April 2021, please look for the latest edition of this guide: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition (ISBN: 9781119786238). CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Six unique 150 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 700 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Mobility Management and Quality-Of-Service for Heterogeneous Networks (Hardcover): Demetres D. Kouvatsos Mobility Management and Quality-Of-Service for Heterogeneous Networks (Hardcover)
Demetres D. Kouvatsos
R3,119 Discovery Miles 31 190 Ships in 12 - 17 working days

Considerable attention is currently devoted worldwide towards mobility issues and challenges such as those arising from the integration of the next generation Internet over terrestrial digital TV, mobile user location management and multi-service mobile networks subject to quality of service (QoS) routing. This book follows Heterogeneous Networks: Performance Modelling and Analysis, describes recent advances in mobile and wireless networks and the Internet reflecting the state-of-the-art technology and research achievements in mobility management, performance enhancement, optimal admission control and QoS worldwide. Technical topics discussed in the book include * Mobility Management; * Optimal Admission Control; * Performance Modelling Studies; * Access Network Coverage; * Quality of Service (QoS); Heterogeneous Networks: Mobility Management and Quality of Service contains recently extended research papers, which have their roots in the series of the HET-NETs International Working Conferences focusing on the 'Performance Modelling and Evaluation of Heterogeneous Networks' under the auspices of the EU Networks of Excellence Euro-NGI and Euro-FGI. Heterogeneous Networks: Mobility Management and Quality of Service, is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science, operational research, electrical engineering and telecommunication systems. Contents Preface; Participants of the Reviewing Process; * Traffic Modelling and Characterisation; * Queueing and Interconnection Networks; * Performance Evaluation Studies; * TCP Performance Analysis; * Congestion Control; * Application Layer Multicast; * Numerical and Software Tools; Author Index; Keyword Index.

Guide to Computer Forensics and Investigations (Paperback, 6th edition): Amelia Phillips, Bill Nelson, Christopher Steuart Guide to Computer Forensics and Investigations (Paperback, 6th edition)
Amelia Phillips, Bill Nelson, Christopher Steuart
R1,400 R1,203 Discovery Miles 12 030 Save R197 (14%) Ships in 10 - 15 working days

Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides free demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.

Performance Modelling and Analysis of Heterogeneous Networks (Hardcover): Demetres D. Kouvatsos Performance Modelling and Analysis of Heterogeneous Networks (Hardcover)
Demetres D. Kouvatsos
R3,119 Discovery Miles 31 190 Ships in 12 - 17 working days

Over the recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of convergent multi-service heterogeneous networks, such as wireless and optical networks, towards the design and dimensioning of the next and future generation Internets. This book follows Heterogeneous Networks: Traffic Engineering, Performance Evaluation Studies and Tools and presents recent advances in networks of diverse technology reflecting the state-of-the-art technology and research achievements in performance modelling, analysis and applications worldwide. Technical topics discussed in the book include: * Multiservice Switching Networks; * Multiservice Switching Networks; * Wireless Ad Hoc Networks; * Wireless Sensor Networks; * Wireless Cellular Networks; * Optical Networks; Heterogeneous Networks:- Performance Modelling and Analysis contains recently extended research papers, which have their roots in the series of the HET-NETs International Working Conferences focusing on the 'Performance Modelling and Evaluation of Heterogeneous Networks' under the auspices of the EU Networks of Excellence Euro-NGI and Euro-FGI. Heterogeneous Networks: Performance Modelling and Analysis is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science, operational research, electrical engineering and telecommunication systems and the Internet. Keywords Heterogeneous networks, performance modelling and analysis, wired networks, wireless networks: ad hoc, sensor and cellular, optical networks, next and future generation Internets.

Traffic and Performance Engineering for Heterogeneous Networks (Hardcover): Demetres D. Kouvatsos Traffic and Performance Engineering for Heterogeneous Networks (Hardcover)
Demetres D. Kouvatsos
R3,087 Discovery Miles 30 870 Ships in 12 - 17 working days

The diversity of methodologies and applications in the literature for the traffic engineering, performance modelling and analysis of convergent multiservice heterogeneous networks attests to the breath and richness of recent research and developments towards the design and dimensioning of the next and future generation Internets. Heterogeneous Networks: Traffic Engineering, Performance Evaluation Studies and Tools describes recent advances in networks of diverse technology reflecting the state-of-the-art technology and research achievements in traffic engineering, performance evaluation studies and tools worldwide. Technical topics presented in the book include: * Traffic Modelling and Characterisation * Queueing and Interconnection Networks * Performance Evaluation Studies * TCP Performance Analysis * Congestion Control * Application Layer Multicast * Numerical and Software Tools; This book contains recently extended research papers, which have their roots in the series of the HET-NETs International Working Conferences focusing on the 'Performance Modelling and Evaluation of Heterogeneous Networks' under the auspices of the EU Networks of Excellence Euro-NGI and Euro-FGI. Heterogeneous Networks: Traffic Engineering, Performance Evaluation Studies and Tools is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science, operational research, electrical engineering and telecommunication systems and the Internet.

Well-Grounded Java Developer, The (Paperback, 2nd edition): Benjamin Evans, Jason Clark, Martijn Verburg Well-Grounded Java Developer, The (Paperback, 2nd edition)
Benjamin Evans, Jason Clark, Martijn Verburg
R1,305 Discovery Miles 13 050 Ships in 12 - 17 working days

Understanding Java from the JVM up gives you a solid foundation to grow your expertise and take on advanced techniques for performance, concurrency, containerization, and more. In The Well-Grounded Java Developer, Second Edition you will learn: The new Java module system and why you should use it Bytecode for the JVM, including operations and classloading Performance tuning the JVM Working with Java's built-in concurrency and expanded options Programming in Kotlin and Clojure on the JVM Maximizing the benefits from your build/CI tooling with Maven and Gradle Running the JVM in containers Planning for future JVM releases The Well-Grounded Java Developer, Second Edition introduces both the modern innovations and timeless fundamentals you need to know to become a Java master. Authors Ben Evans, Martijn Verburg, and Jason Clark distil their decades of experience as Java Champions, veteran developers, and key contributors to the Java ecosystem into this clear and practical guide. about the technology Java's history of innovation, its huge collection of libraries and frameworks, and the flexibility of the JVM have cemented its place as one of the world's most popular programming languages. Although it's easy to get started with Java, understanding how the language intersects with the JVM is the key to unlocking the power of this awesome language and its deep ecosystem of frameworks, tools, and alternative JVM-based languages. about the book The Well-Grounded Java Developer, Second Edition is a complete revision of the classic original with the latest innovations of the Java platform. It upgrades your existing Java skills with both JVM fundamentals like bytecode, and powerful new features such as modules and concurrency models. You'll broaden your understanding of what's possible by exploring Kotlin and other JVM languages, and learn how functional programming can offer a powerful new perspective. Each concept is illustrated with hands-on examples, including a fully modularized application/library, build setups for Maven and Gradle, and creating your own multithreaded application.

How to Develop and Implement a Security Master Plan (Hardcover): Timothy Giles How to Develop and Implement a Security Master Plan (Hardcover)
Timothy Giles
R3,705 Discovery Miles 37 050 Ships in 12 - 17 working days

Engage Stakeholders with a Long-Term Solution

The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.

The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.

Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization's particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:

  • Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments
  • Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement
  • Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan
  • Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business

Apply Insights from an Expert with Global Experience at the Highest Level
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company's operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.

Building Machine Learning Pipelines (Paperback): Hannes Hapke Building Machine Learning Pipelines (Paperback)
Hannes Hapke; Contributions by Catherine Nelson
R1,337 Discovery Miles 13 370 Ships in 12 - 17 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Designing Switch/Routers - Fundamental…
James Aweya Hardcover R9,091 Discovery Miles 90 910
CompTIA A+ Complete Study Guide: Core 1…
Q Docter Paperback R1,220 Discovery Miles 12 200
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,948 Discovery Miles 29 480
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,124 R907 Discovery Miles 9 070
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,198 Discovery Miles 11 980
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,225 Discovery Miles 12 250
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R635 Discovery Miles 6 350
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270

 

Partners