0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,630)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover)
Adam Dodson
R546 R500 Discovery Miles 5 000 Save R46 (8%) Ships in 18 - 22 working days
Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover): Brij B. Gupta Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover)
Brij B. Gupta
R5,324 Discovery Miles 53 240 Ships in 18 - 22 working days

In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Amazon EMR Management Guide (Hardcover): Documentation Team Amazon EMR Management Guide (Hardcover)
Documentation Team
R1,958 Discovery Miles 19 580 Ships in 18 - 22 working days
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,137 Discovery Miles 71 370 Ships in 18 - 22 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Security and Privacy Vision in 6G - A Comprehensive Guide (Hardcover): Pawani Porambage, Madhusanka Liyanage Security and Privacy Vision in 6G - A Comprehensive Guide (Hardcover)
Pawani Porambage, Madhusanka Liyanage
R2,918 Discovery Miles 29 180 Ships in 18 - 22 working days

SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication with this comprehensive study 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. Security and Privacy Vision in 6G provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. Security and Privacy Vision in 6G readers will also find: Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more Treatment balancing the practical and the theoretical An editorial team with decades of international network technology experience in both industry and academia Security and Privacy Vision in 6G is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.

AWS Certificate Manager User Guide (Hardcover): Documentation Team AWS Certificate Manager User Guide (Hardcover)
Documentation Team
R909 Discovery Miles 9 090 Ships in 18 - 22 working days
Amazon Simple Storage Service Developer Guide (Hardcover): Documentation Team Amazon Simple Storage Service Developer Guide (Hardcover)
Documentation Team
R2,391 Discovery Miles 23 910 Ships in 18 - 22 working days
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Hardcover): K Martin Sagayam, Bharat Bhushan, A.... Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Hardcover)
K Martin Sagayam, Bharat Bhushan, A. Diana Andrushia; Contributions by Victor Hugo C. de Albuquerque
R5,452 Discovery Miles 54 520 Ships in 18 - 22 working days

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.

AWS CloudHSM User Guide (Hardcover): Documentation Team AWS CloudHSM User Guide (Hardcover)
Documentation Team
R1,703 Discovery Miles 17 030 Ships in 18 - 22 working days
Secure Cyber-Physical Systems for Smart Cities (Hardcover): Riaz Ahmed Shaikh Secure Cyber-Physical Systems for Smart Cities (Hardcover)
Riaz Ahmed Shaikh
R5,572 Discovery Miles 55 720 Ships in 18 - 22 working days

Interest in developing smart cities has grown exponentially over the years with many governments across the world hoping to initiate these projects in their own countries. One of the key challenges for the success of any smart city project is the assurance of smart security and privacy of the citizens. Due to the use of a wide range of interconnected cyber-physical systems, traditional security solutions cannot be applied to smart city applications, and new practices must be sought. Secure Cyber-Physical Systems for Smart Cities is an essential reference publication that examines information security and privacy in smart city settings including discussions on new security frameworks, solutions, cybersecurity laws and regulations, and risk management frameworks for smart city environments. Covering a wide range of topics including wireless networks, security, and cyber-physical systems, this book is ideally designed for IT specialists and consultants, engineers, government officials, policymakers, researchers, academicians, and industry professionals.

AWS Billing and Cost Management User Guide (Hardcover): Documentation Team AWS Billing and Cost Management User Guide (Hardcover)
Documentation Team
R1,752 R1,430 Discovery Miles 14 300 Save R322 (18%) Ships in 18 - 22 working days
ISE Data Communications and Networking with TCP/IP Protocol Suite (Paperback, 6th edition): Behrouz A. Forouzan ISE Data Communications and Networking with TCP/IP Protocol Suite (Paperback, 6th edition)
Behrouz A. Forouzan
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

Data Communications and Networking, 6th Edition, teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the TCP/IP protocol suite is built on the services provided by the layer below. This edition has undergone a major restructuring to reduce the number of chapters and focus on the organization of TCP/IP protocol suite. It concludes with three chapters that explore multimedia, network management, and cryptography/network security. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Data Communications and Networking.

IoT Protocols and Applications for Improving Industry, Environment, and Society (Hardcover): Cristian Gonzalez Garcia, Vicente... IoT Protocols and Applications for Improving Industry, Environment, and Society (Hardcover)
Cristian Gonzalez Garcia, Vicente Garcia Diaz
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

With the internet of things (IoT), it is proven that enormous networks can be created to interconnect objects and facilitate daily life in a variety of domains. Research is needed to study how these improvements can be applied in different ways, using different technologies, and through the creation of different applications. IoT Protocols and Applications for Improving Industry, Environment, and Society contains the latest research on the most important areas and challenges in the internet of things and its intersection with technologies and tools such as artificial intelligence, blockchain, model-driven engineering, and cloud computing. The book covers subfields that examine smart homes, smart towns, smart earth, and the industrial internet of things in order to improve daily life, protect the environment, and create safer and easier jobs. While covering a range of topics within IoT including Industry 4.0, security, and privacy, this book is ideal for computer scientists, engineers, practitioners, stakeholders, researchers, academicians, and students who are interested in the latest applications of IoT.

AWS OpsWorks User Guide (Hardcover): Documentation Team AWS OpsWorks User Guide (Hardcover)
Documentation Team
R2,413 Discovery Miles 24 130 Ships in 18 - 22 working days
Amazon Lex Developer Guide (Hardcover): Documentation Team Amazon Lex Developer Guide (Hardcover)
Documentation Team
R2,223 Discovery Miles 22 230 Ships in 18 - 22 working days
Security and Privacy Issues in Sensor Networks and IoT (Hardcover): Priyanka Ahlawat, Mayank Dave Security and Privacy Issues in Sensor Networks and IoT (Hardcover)
Priyanka Ahlawat, Mayank Dave
R5,330 Discovery Miles 53 300 Ships in 18 - 22 working days

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.

Handbook of Research on Advanced Applications of Graph Theory in Modern Society (Hardcover): Madhumangal Pal, Sovan Samanta,... Handbook of Research on Advanced Applications of Graph Theory in Modern Society (Hardcover)
Madhumangal Pal, Sovan Samanta, Anita Pal
R6,710 Discovery Miles 67 100 Ships in 18 - 22 working days

In the world of mathematics and computer science, technological advancements are constantly being researched and applied to ongoing issues. Setbacks in social networking, engineering, and automation are themes that affect everyday life, and researchers have been looking for new techniques in which to solve these challenges. Graph theory is a widely studied topic that is now being applied to real-life problems. Advanced Applications of Graph Theory in Modern Society is an essential reference source that discusses recent developments on graph theory, as well as its representation in social networks, artificial neural networks, and many complex networks. The book aims to study results that are useful in the fields of robotics and machine learning and will examine different engineering issues that are closely related to fuzzy graph theory. Featuring research on topics such as artificial neural systems and robotics, this book is ideally designed for mathematicians, research scholars, practitioners, professionals, engineers, and students seeking an innovative overview of graphic theory.

Virtual Reality and Its Application in Education (Hardcover): Dragan Cvetkovic Virtual Reality and Its Application in Education (Hardcover)
Dragan Cvetkovic
R2,557 Discovery Miles 25 570 Ships in 18 - 22 working days
System Assurance - Beyond Detecting Vulnerabilities (Paperback): Nikolai Mansourov, Djenana Campara System Assurance - Beyond Detecting Vulnerabilities (Paperback)
Nikolai Mansourov, Djenana Campara
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion.

System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance, the book teaches you how to use the Object Management Group s (OMG) expertise and unique standards to obtain accurate knowledge about your existing software and compose objective metrics for system assurance. OMG s Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about your existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, you will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and affordable System Assurance.Includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture and code analysis guided by the assurance argument.Case Study illustrating the steps of the System Assurance Methodology using automated tools."

Web 2.0 and Cloud Technologies for Implementing Connected Government (Hardcover): Zaigham Mahmood Web 2.0 and Cloud Technologies for Implementing Connected Government (Hardcover)
Zaigham Mahmood
R5,405 Discovery Miles 54 050 Ships in 18 - 22 working days

The emergence of cloud computing, internet of things, mobile technologies, and social networking have created better-connected members of the public who are digitally linked with each other in real time. Establishing this two-way interaction between citizens and governments has thus become attractive and an expected feature of governments worldwide. Previously, federal and local governments relied on first-generation technologies to provide basic levels of automation and digitization. Now, because of their desire to become more open, transparent, accountable, and connected, newer technologies including cloud computing, mobile networking, big data analytics, Web 2.0, and social media must be developed and utilized. Web 2.0 and Cloud Technologies for Implementing Connected Government is an essential reference source that presents various dimensions of connected government and connected e-governance visions as well as the latest emerging technologies. Offering development methodologies, practical examples, best practices, case studies, and the latest research, this book covers new strategies for implementing better-connected government models and the technologies that serve to establish these frameworks, including in-depth examinations of mobile technologies, automation, business intelligence, etc. as well as the various ethical and security issues surrounding the use and protection of data. This book is essential for federal, state, and local government officials; policymakers; civil servants; IT specialists; security analysts; academicians; researchers; and students.

Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover): Information Resources Management Association Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover)
Information Resources Management Association
R11,898 Discovery Miles 118 980 Ships in 18 - 22 working days

In recent years, smart cities have been an emerging area of interest across the world. Due to this, numerous technologies and tools, such as building information modeling (BIM) and digital twins, have been developed to help achieve smart cities. To ensure research is continuously up to date and new technologies are considered within the field, further study is required. The Research Anthology on BIM and Digital Twins in Smart Cities considers the uses, challenges, and opportunities of BIM and digital twins within smart cities. Covering key topics such as data, design, urban areas, technology, and sustainability, this major reference work is ideal for industry professionals, government officials, computer scientists, policymakers, researchers, scholars, practitioners, instructors, and students.

Amazon Athena User Guide (Hardcover): Documentation Team Amazon Athena User Guide (Hardcover)
Documentation Team
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days
Statistical Analysis of Networks (Hardcover): Konstantin Avrachenkov, Maximilien Dreveton Statistical Analysis of Networks (Hardcover)
Konstantin Avrachenkov, Maximilien Dreveton
R3,164 Discovery Miles 31 640 Ships in 18 - 22 working days

This book is a general introduction to the statistical analysis of networks, and can serve both as a research monograph and as a textbook. Numerous fundamental tools and concepts needed for the analysis of networks are presented, such as network modeling, community detection, graph-based semi-supervised learning and sampling in networks. The description of these concepts is self-contained, with both theoretical justifications and applications provided for the presented algorithms.Researchers, including postgraduate students, working in the area of network science, complex network analysis, or social network analysis, will find up-to-date statistical methods relevant to their research tasks. This book can also serve as textbook material for courses related to thestatistical approach to the analysis of complex networks.In general, the chapters are fairly independent and self-supporting, and the book could be used for course composition "a la carte". Nevertheless, Chapter 2 is needed to a certain degree for all parts of the book. It is also recommended to read Chapter 4 before reading Chapters 5 and 6, but this is not absolutely necessary. Reading Chapter 3 can also be helpful before reading Chapters 5 and 7. As prerequisites for reading this book, a basic knowledge in probability, linear algebra and elementary notions of graph theory is advised. Appendices describing required notions from the above mentioned disciplines have been added to help readers gain further understanding.

AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide (Hardcover): Documentation Team AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide (Hardcover)
Documentation Team
R1,173 Discovery Miles 11 730 Ships in 18 - 22 working days
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R6,212 Discovery Miles 62 120 Ships in 18 - 22 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420

 

Partners