0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (275)
  • R250 - R500 (878)
  • R500+ (13,584)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Amazon CloudFront Developer Guide (Hardcover): Documentation Team Amazon CloudFront Developer Guide (Hardcover)
Documentation Team
R1,511 Discovery Miles 15 110 Ships in 18 - 22 working days
Amazon Lex Developer Guide (Hardcover): Documentation Team Amazon Lex Developer Guide (Hardcover)
Documentation Team
R2,223 Discovery Miles 22 230 Ships in 18 - 22 working days
Security and Privacy Issues in Sensor Networks and IoT (Hardcover): Priyanka Ahlawat, Mayank Dave Security and Privacy Issues in Sensor Networks and IoT (Hardcover)
Priyanka Ahlawat, Mayank Dave
R5,330 Discovery Miles 53 300 Ships in 18 - 22 working days

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.

Handbook of Research on Advanced Applications of Graph Theory in Modern Society (Hardcover): Madhumangal Pal, Sovan Samanta,... Handbook of Research on Advanced Applications of Graph Theory in Modern Society (Hardcover)
Madhumangal Pal, Sovan Samanta, Anita Pal
R6,710 Discovery Miles 67 100 Ships in 18 - 22 working days

In the world of mathematics and computer science, technological advancements are constantly being researched and applied to ongoing issues. Setbacks in social networking, engineering, and automation are themes that affect everyday life, and researchers have been looking for new techniques in which to solve these challenges. Graph theory is a widely studied topic that is now being applied to real-life problems. Advanced Applications of Graph Theory in Modern Society is an essential reference source that discusses recent developments on graph theory, as well as its representation in social networks, artificial neural networks, and many complex networks. The book aims to study results that are useful in the fields of robotics and machine learning and will examine different engineering issues that are closely related to fuzzy graph theory. Featuring research on topics such as artificial neural systems and robotics, this book is ideally designed for mathematicians, research scholars, practitioners, professionals, engineers, and students seeking an innovative overview of graphic theory.

AWS Certificate Manager User Guide (Hardcover): Documentation Team AWS Certificate Manager User Guide (Hardcover)
Documentation Team
R909 Discovery Miles 9 090 Ships in 18 - 22 working days
Virtual Reality and Its Application in Education (Hardcover): Dragan Cvetkovic Virtual Reality and Its Application in Education (Hardcover)
Dragan Cvetkovic
R2,557 Discovery Miles 25 570 Ships in 18 - 22 working days
Web 2.0 and Cloud Technologies for Implementing Connected Government (Hardcover): Zaigham Mahmood Web 2.0 and Cloud Technologies for Implementing Connected Government (Hardcover)
Zaigham Mahmood
R5,405 Discovery Miles 54 050 Ships in 18 - 22 working days

The emergence of cloud computing, internet of things, mobile technologies, and social networking have created better-connected members of the public who are digitally linked with each other in real time. Establishing this two-way interaction between citizens and governments has thus become attractive and an expected feature of governments worldwide. Previously, federal and local governments relied on first-generation technologies to provide basic levels of automation and digitization. Now, because of their desire to become more open, transparent, accountable, and connected, newer technologies including cloud computing, mobile networking, big data analytics, Web 2.0, and social media must be developed and utilized. Web 2.0 and Cloud Technologies for Implementing Connected Government is an essential reference source that presents various dimensions of connected government and connected e-governance visions as well as the latest emerging technologies. Offering development methodologies, practical examples, best practices, case studies, and the latest research, this book covers new strategies for implementing better-connected government models and the technologies that serve to establish these frameworks, including in-depth examinations of mobile technologies, automation, business intelligence, etc. as well as the various ethical and security issues surrounding the use and protection of data. This book is essential for federal, state, and local government officials; policymakers; civil servants; IT specialists; security analysts; academicians; researchers; and students.

Handbook of Big Data Analytics, Volume 1 - Methodologies (Hardcover): Vadlamani Ravi, Aswani Kumar Cherukuri Handbook of Big Data Analytics, Volume 1 - Methodologies (Hardcover)
Vadlamani Ravi, Aswani Kumar Cherukuri
R3,428 R3,093 Discovery Miles 30 930 Save R335 (10%) Ships in 18 - 22 working days

Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitous in all fields of science, engineering, business and management due to the rise of data-driven models as well as data engineering developments using parallel and distributed computational analytics frameworks, data and algorithm parallelization, and GPGPU programming. However, there remain potential issues that need to be addressed to enable big data processing and analytics in real time. In the first volume of this comprehensive two-volume handbook, the authors present several methodologies to support Big Data analytics including database management, processing frameworks and architectures, data lakes, query optimization strategies, towards real-time data processing, data stream analytics, Fog and Edge computing, and Artificial Intelligence and Big Data. The second volume is dedicated to a wide range of applications in secure data storage, privacy-preserving, Software Defined Networks (SDN), Internet of Things (IoTs), behaviour analytics, traffic predictions, gender based classification on e-commerce data, recommender systems, Big Data regression with Apache Spark, visual sentiment analysis, wavelet Neural Network via GPU, stock market movement predictions, and financial reporting. The two-volume work is aimed at providing a unique platform for researchers, engineers, developers, educators and advanced students in the field of Big Data analytics.

Ethical Hacking - The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks... Ethical Hacking - The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks for Beginners, Including Tips on Social Engineering (Hardcover)
Lester Evans
R664 R593 Discovery Miles 5 930 Save R71 (11%) Ships in 18 - 22 working days
Hacking Into Computer Systems - - A Beginners Guide (Paperback): Rubin Heath Hacking Into Computer Systems - - A Beginners Guide (Paperback)
Rubin Heath
R517 Discovery Miles 5 170 Ships in 18 - 22 working days
Statistical Analysis of Networks (Hardcover): Konstantin Avrachenkov, Maximilien Dreveton Statistical Analysis of Networks (Hardcover)
Konstantin Avrachenkov, Maximilien Dreveton
R3,164 Discovery Miles 31 640 Ships in 18 - 22 working days

This book is a general introduction to the statistical analysis of networks, and can serve both as a research monograph and as a textbook. Numerous fundamental tools and concepts needed for the analysis of networks are presented, such as network modeling, community detection, graph-based semi-supervised learning and sampling in networks. The description of these concepts is self-contained, with both theoretical justifications and applications provided for the presented algorithms.Researchers, including postgraduate students, working in the area of network science, complex network analysis, or social network analysis, will find up-to-date statistical methods relevant to their research tasks. This book can also serve as textbook material for courses related to thestatistical approach to the analysis of complex networks.In general, the chapters are fairly independent and self-supporting, and the book could be used for course composition "a la carte". Nevertheless, Chapter 2 is needed to a certain degree for all parts of the book. It is also recommended to read Chapter 4 before reading Chapters 5 and 6, but this is not absolutely necessary. Reading Chapter 3 can also be helpful before reading Chapters 5 and 7. As prerequisites for reading this book, a basic knowledge in probability, linear algebra and elementary notions of graph theory is advised. Appendices describing required notions from the above mentioned disciplines have been added to help readers gain further understanding.

Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R6,212 Discovery Miles 62 120 Ships in 18 - 22 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

Cloud Architecture and Engineering (Hardcover): Conor Suarez Cloud Architecture and Engineering (Hardcover)
Conor Suarez
R3,165 R2,867 Discovery Miles 28 670 Save R298 (9%) Ships in 18 - 22 working days
Cryptography - Recent Advances and Future Developments (Hardcover): Riccardo Bernardini Cryptography - Recent Advances and Future Developments (Hardcover)
Riccardo Bernardini
R3,068 Discovery Miles 30 680 Ships in 18 - 22 working days
Security in Vehicular Networks - Focus on Location  and Identity Privacy (Hardcover): L Benarous Security in Vehicular Networks - Focus on Location and Identity Privacy (Hardcover)
L Benarous
R3,490 Discovery Miles 34 900 Ships in 18 - 22 working days

Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover)
Information R Management Association
R11,906 Discovery Miles 119 060 Ships in 18 - 22 working days
Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover): Osman Khalid,... Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover)
Osman Khalid, Samee U. Khan, Albert Y. Zomaya
R3,323 R3,000 Discovery Miles 30 000 Save R323 (10%) Ships in 18 - 22 working days

First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data to suggest information, products, and services that best match their preferences. In recent decades, we have seen an exponential increase in the volumes of data, which has introduced many new challenges. Divided into two volumes, this comprehensive set covers recent advances, challenges, novel solutions, and applications in big data recommender systems. Volume 1 contains 14 chapters addressing foundations, algorithms and architectures, approaches for big data, and trust and security measures. Volume 2 covers a broad range of application paradigms for recommender systems over 22 chapters.

Mobile Computing and Wireless Communications (Hardcover): Timothy Kolaya Mobile Computing and Wireless Communications (Hardcover)
Timothy Kolaya
R3,076 R2,791 Discovery Miles 27 910 Save R285 (9%) Ships in 18 - 22 working days
Global Virtual Enterprises in Cloud Computing Environments (Hardcover): N. Raghavendra Rao Global Virtual Enterprises in Cloud Computing Environments (Hardcover)
N. Raghavendra Rao
R5,321 Discovery Miles 53 210 Ships in 18 - 22 working days

Modern businesses are on the lookout for ventures that boost their profits and marketability. Certain new and innovative technological advances can help enterprises accomplish their ambitious goals while providing detailed information to assess all aspects of the business. Global Virtual Enterprises in Cloud Computing Environments is a collection of innovative studies on business processes, procedures, methods, strategy, management thinking, and utilization of technology in cloud computing environments. While highlighting topics including international business strategy, virtual reality, and intellectual capital, this book is ideally designed for corporate executives, research scholars, and students pursuing courses in the areas of management and big data applications seeking current research on effective open innovation strategies in global business.

Impact of Digital Transformation on Security Policies and Standards (Hardcover): Sam Goundar, S. Bharath Bhushan, Vaishali... Impact of Digital Transformation on Security Policies and Standards (Hardcover)
Sam Goundar, S. Bharath Bhushan, Vaishali Ravindra Thakare
R5,936 Discovery Miles 59 360 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

How To Do Virtualization - Your Step By Step Guide To Virtualization (Hardcover): Howexpert How To Do Virtualization - Your Step By Step Guide To Virtualization (Hardcover)
Howexpert
R719 Discovery Miles 7 190 Ships in 18 - 22 working days
Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,514 Discovery Miles 45 140 Ships in 18 - 22 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Telecommunications Engineering: Networks and Architecture (Hardcover): Bernhard Ekman Telecommunications Engineering: Networks and Architecture (Hardcover)
Bernhard Ekman
R3,177 R2,879 Discovery Miles 28 790 Save R298 (9%) Ships in 18 - 22 working days
On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R680 Discovery Miles 6 800 Ships in 18 - 22 working days
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover): Gregory B White,... Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover)
Gregory B White, Natalie Sjelin
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Racial Immanence - Chicanx Bodies beyond…
Marissa K Lopez Hardcover R2,628 Discovery Miles 26 280
A Manifesto For Social Change - How To…
Moeletsi Mbeki, Nobantu Mbeki Paperback  (4)
R230 R209 Discovery Miles 2 090
The Oxford Handbook of Global Modernisms
Mark Wollaeger Hardcover R5,442 Discovery Miles 54 420
A Streetcar Named Desire - York Notes…
Tennessee Williams Paperback  (2)
R249 R170 Discovery Miles 1 700
Working Women, Literary Ladies - The…
Sylvia J Cook Hardcover R1,753 Discovery Miles 17 530
Americanizing Britain - The Rise of…
Genevieve Abravanel Hardcover R2,579 Discovery Miles 25 790
The Last Word - The Hollywood Novel and…
Justin Gautreau Hardcover R3,052 Discovery Miles 30 520
Next Generation Adaptation…
Allen H. Redmon Hardcover R2,942 Discovery Miles 29 420
Forms of Dictatorship - Power…
Jennifer Harford Vargas Hardcover R2,223 Discovery Miles 22 230
Playing in the White - Black Writers…
Stephanie Li Hardcover R2,436 Discovery Miles 24 360

 

Partners