0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (831)
  • R500+ (14,090)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Deep Learning AMI Developer Guide (Hardcover): Documentation Team Deep Learning AMI Developer Guide (Hardcover)
Documentation Team
R1,275 Discovery Miles 12 750 Ships in 10 - 15 working days
AWS Elemental MediaConvert User Guide (Hardcover): Documentation Team AWS Elemental MediaConvert User Guide (Hardcover)
Documentation Team
R965 Discovery Miles 9 650 Ships in 10 - 15 working days
Cryptography - Recent Advances and Future Developments (Hardcover): Riccardo Bernardini Cryptography - Recent Advances and Future Developments (Hardcover)
Riccardo Bernardini
R3,324 Discovery Miles 33 240 Ships in 10 - 15 working days
AWS Glue Developer Guide (Hardcover): Documentation Team AWS Glue Developer Guide (Hardcover)
Documentation Team
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days
Strategic Approaches to Digital Platform Security Assurance (Hardcover): Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves... Strategic Approaches to Digital Platform Security Assurance (Hardcover)
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
R5,784 Discovery Miles 57 840 Ships in 10 - 15 working days

Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R9,712 Discovery Miles 97 120 Ships in 10 - 15 working days
AWS Schema Conversion Tool User Guide (Hardcover): Documentation Team AWS Schema Conversion Tool User Guide (Hardcover)
Documentation Team
R1,873 Discovery Miles 18 730 Ships in 10 - 15 working days
Security in Computer and Information Sciences (Hardcover): Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios Security in Computer and Information Sciences (Hardcover)
Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios
R1,394 Discovery Miles 13 940 Ships in 10 - 15 working days
Computer Networking and Cybersecurity (Paperback): Quinn Kiser Computer Networking and Cybersecurity (Paperback)
Quinn Kiser
R862 R751 Discovery Miles 7 510 Save R111 (13%) Ships in 10 - 15 working days
Amazon Kinesis Data Analytics Developer Guide (Hardcover): Documentation Team Amazon Kinesis Data Analytics Developer Guide (Hardcover)
Documentation Team
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days
Real-Time and Retrospective Analyses of Cyber Security (Hardcover): David Anthony Bird Real-Time and Retrospective Analyses of Cyber Security (Hardcover)
David Anthony Bird
R5,774 Discovery Miles 57 740 Ships in 10 - 15 working days

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R9,712 Discovery Miles 97 120 Ships in 10 - 15 working days
Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover): Information Resources Management Association Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover)
Information Resources Management Association
R12,911 Discovery Miles 129 110 Ships in 10 - 15 working days

In recent years, smart cities have been an emerging area of interest across the world. Due to this, numerous technologies and tools, such as building information modeling (BIM) and digital twins, have been developed to help achieve smart cities. To ensure research is continuously up to date and new technologies are considered within the field, further study is required. The Research Anthology on BIM and Digital Twins in Smart Cities considers the uses, challenges, and opportunities of BIM and digital twins within smart cities. Covering key topics such as data, design, urban areas, technology, and sustainability, this major reference work is ideal for industry professionals, government officials, computer scientists, policymakers, researchers, scholars, practitioners, instructors, and students.

Amazon Virtual Private Cloud Network Administrator Guide (Hardcover): Documentation Team Amazon Virtual Private Cloud Network Administrator Guide (Hardcover)
Documentation Team
R1,281 Discovery Miles 12 810 Ships in 10 - 15 working days
iTECH-NICALLY SAID THAT (Hardcover): Kimber Woods iTECH-NICALLY SAID THAT (Hardcover)
Kimber Woods
R1,080 Discovery Miles 10 800 Ships in 12 - 19 working days
AWS Systems Manager User Guide (Hardcover): Documentation Team AWS Systems Manager User Guide (Hardcover)
Documentation Team
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days
Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,710 Discovery Miles 97 100 Ships in 10 - 15 working days
Deep Learning through Sparse and Low-Rank Modeling (Paperback): Zhangyang Wang, Yun Fu, Thomas S. Huang Deep Learning through Sparse and Low-Rank Modeling (Paperback)
Zhangyang Wang, Yun Fu, Thomas S. Huang
R2,191 Discovery Miles 21 910 Ships in 12 - 19 working days

Deep Learning through Sparse Representation and Low-Rank Modeling bridges classical sparse and low rank models-those that emphasize problem-specific Interpretability-with recent deep network models that have enabled a larger learning capacity and better utilization of Big Data. It shows how the toolkit of deep learning is closely tied with the sparse/low rank methods and algorithms, providing a rich variety of theoretical and analytic tools to guide the design and interpretation of deep learning models. The development of the theory and models is supported by a wide variety of applications in computer vision, machine learning, signal processing, and data mining. This book will be highly useful for researchers, graduate students and practitioners working in the fields of computer vision, machine learning, signal processing, optimization and statistics.

Securing Delay-Tolerant Networks with BPSec (Hardcover): Birrane Securing Delay-Tolerant Networks with BPSec (Hardcover)
Birrane
R3,394 Discovery Miles 33 940 Ships in 10 - 15 working days

Securing Delay-Tolerant Networks with BPSec One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?" The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments. The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included. Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches. Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on: The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover): Amit Kumar Tyagi Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover)
Amit Kumar Tyagi
R8,726 Discovery Miles 87 260 Ships in 10 - 15 working days

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.

Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems (Hardcover): Michael A. Yastrebenetsky,... Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems (Hardcover)
Michael A. Yastrebenetsky, Vyacheslav S. Kharchenko
R5,834 Discovery Miles 58 340 Ships in 10 - 15 working days

Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and control systems, which play a vital role in the prevention of these incidents, have seen major design modifications with the implementation of digital technologies. Advanced computing systems are assisting in the protection and safety of nuclear power plants; however, significant research on these computational methods is deficient. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems is a pivotal reference source that provides vital research on the digital developments of instrumentation and control systems for assuring the safety and security of nuclear power plants. While highlighting topics such as accident monitoring systems, classification measures, and UAV fleets, this publication explores individual cases of security breaches as well as future methods of practice. This book is ideally designed for engineers, industry specialists, researchers, policymakers, scientists, academicians, practitioners, and students involved in the development and operation of instrumentation and control systems for nuclear power plants, chemical and petrochemical industries, transport, and medical equipment.

Amazon API Gateway Developer Guide (Hardcover): Documentation Team Amazon API Gateway Developer Guide (Hardcover)
Documentation Team
R3,053 Discovery Miles 30 530 Ships in 10 - 15 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover)
Information R Management Association
R12,920 Discovery Miles 129 200 Ships in 10 - 15 working days
IoT Protocols and Applications for Improving Industry, Environment, and Society (Hardcover): Cristian Gonzalez Garcia, Vicente... IoT Protocols and Applications for Improving Industry, Environment, and Society (Hardcover)
Cristian Gonzalez Garcia, Vicente Garcia Diaz
R7,211 Discovery Miles 72 110 Ships in 10 - 15 working days

With the internet of things (IoT), it is proven that enormous networks can be created to interconnect objects and facilitate daily life in a variety of domains. Research is needed to study how these improvements can be applied in different ways, using different technologies, and through the creation of different applications. IoT Protocols and Applications for Improving Industry, Environment, and Society contains the latest research on the most important areas and challenges in the internet of things and its intersection with technologies and tools such as artificial intelligence, blockchain, model-driven engineering, and cloud computing. The book covers subfields that examine smart homes, smart towns, smart earth, and the industrial internet of things in order to improve daily life, protect the environment, and create safer and easier jobs. While covering a range of topics within IoT including Industry 4.0, security, and privacy, this book is ideal for computer scientists, engineers, practitioners, stakeholders, researchers, academicians, and students who are interested in the latest applications of IoT.

Secure Cyber-Physical Systems for Smart Cities (Hardcover): Riaz Ahmed Shaikh Secure Cyber-Physical Systems for Smart Cities (Hardcover)
Riaz Ahmed Shaikh
R6,043 Discovery Miles 60 430 Ships in 10 - 15 working days

Interest in developing smart cities has grown exponentially over the years with many governments across the world hoping to initiate these projects in their own countries. One of the key challenges for the success of any smart city project is the assurance of smart security and privacy of the citizens. Due to the use of a wide range of interconnected cyber-physical systems, traditional security solutions cannot be applied to smart city applications, and new practices must be sought. Secure Cyber-Physical Systems for Smart Cities is an essential reference publication that examines information security and privacy in smart city settings including discussions on new security frameworks, solutions, cybersecurity laws and regulations, and risk management frameworks for smart city environments. Covering a wide range of topics including wireless networks, security, and cyber-physical systems, this book is ideally designed for IT specialists and consultants, engineers, government officials, policymakers, researchers, academicians, and industry professionals.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Building Automated Trading Systems…
Benjamin Van Vliet Hardcover R1,983 Discovery Miles 19 830
C++ How to Program: Horizon Edition
Harvey Deitel, Paul Deitel Paperback R1,917 Discovery Miles 19 170
Formal Methods: State of the Art and New…
Paul Boca, Jonathan P. Bowen, … Hardcover R3,044 Discovery Miles 30 440
Lattice-Based Public-Key Cryptography in…
Sujoy Sinha Roy, Ingrid Verbauwhede Hardcover R1,644 Discovery Miles 16 440
Amazon Web Services in Action
Michael Wittig, Andreas Wittig Paperback R1,133 Discovery Miles 11 330
Arithmetic and Algebraic Circuits
Antonio Lloris Ruiz, Encarnacion Castillo Morales, … Hardcover R5,234 Discovery Miles 52 340
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire Hardcover R6,675 Discovery Miles 66 750
Aws - The Most Complete Guide to Amazon…
Aiden Phillips Hardcover R808 R707 Discovery Miles 7 070
Principles of Security and Trust - 7th…
Lujo Bauer, Ralf Kusters Hardcover R1,673 Discovery Miles 16 730
The JR Programming Language - Concurrent…
Ronald A Olsson, Aaron W. Keen Hardcover R1,749 Discovery Miles 17 490

 

Partners