0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (343)
  • R250 - R500 (896)
  • R500+ (14,155)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

AWS CodeBuild User Guide (Hardcover): Documentation Team AWS CodeBuild User Guide (Hardcover)
Documentation Team
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days
Security and Privacy Issues in Sensor Networks and IoT (Hardcover): Priyanka Ahlawat, Mayank Dave Security and Privacy Issues in Sensor Networks and IoT (Hardcover)
Priyanka Ahlawat, Mayank Dave
R5,756 Discovery Miles 57 560 Ships in 12 - 17 working days

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.

Amazon GuardDuty User Guide (Hardcover): Documentation Team Amazon GuardDuty User Guide (Hardcover)
Documentation Team
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days
Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Hardcover): Alex Wagner Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Hardcover)
Alex Wagner
R1,047 R855 Discovery Miles 8 550 Save R192 (18%) Ships in 10 - 15 working days
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover): Arif Sari Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover)
Arif Sari
R5,240 Discovery Miles 52 400 Ships in 12 - 17 working days

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R7,214 Discovery Miles 72 140 Ships in 12 - 17 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Amazon Kinesis Video Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Video Streams Developer Guide (Hardcover)
Documentation Team
R1,256 Discovery Miles 12 560 Ships in 10 - 15 working days
Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,845 Discovery Miles 48 450 Ships in 12 - 17 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Virtual Reality and Its Application in Education (Hardcover): Dragan Cvetkovic Virtual Reality and Its Application in Education (Hardcover)
Dragan Cvetkovic
R2,941 R2,755 Discovery Miles 27 550 Save R186 (6%) Ships in 10 - 15 working days
Privacy and Legal Issues in Cloud Computing (Paperback): Anne S.Y. Cheung, Rolf H. Weber Privacy and Legal Issues in Cloud Computing (Paperback)
Anne S.Y. Cheung, Rolf H. Weber
R1,360 Discovery Miles 13 600 Ships in 12 - 17 working days

Using a multi-disciplinary and comparative approach, this study examines emerging and innovative attempts to tackle privacy and legal issues in cloud computing such as personal data privacy, security and intellectual property protection. An international team of legal scholars, computer science researchers, regulators and practitioners present original and critical responses to the growing challenges posed by cloud computing. They analyze the specific legal implications pertaining to jurisdiction, biomedical practice and information ownership, as well as issues of regulatory control, competition and cross-border regulation. Law academics, practitioners and regulators will find this book to be a valuable, practical and accessible resource, as will computer science scholars interested in cloud computing issues. Contributors: H. Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y. Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny, C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu

Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (Hardcover): Romil Rawat, Vinod Mahor, Shrikant... Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (Hardcover)
Romil Rawat, Vinod Mahor, Shrikant Telang; Kiran Pachlasiya
R6,693 Discovery Miles 66 930 Ships in 12 - 17 working days

Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.

Cloud Architecture and Engineering (Hardcover): Conor Suarez Cloud Architecture and Engineering (Hardcover)
Conor Suarez
R3,526 R3,095 Discovery Miles 30 950 Save R431 (12%) Ships in 10 - 15 working days
AWS Lambda Developer Guide (Hardcover): Documentation Team AWS Lambda Developer Guide (Hardcover)
Documentation Team
R2,970 Discovery Miles 29 700 Ships in 10 - 15 working days
Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover): William Vance Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover)
William Vance
R641 R540 Discovery Miles 5 400 Save R101 (16%) Ships in 10 - 15 working days
Amazon WorkMail User Guide (Hardcover): Documentation Team Amazon WorkMail User Guide (Hardcover)
Documentation Team
R938 Discovery Miles 9 380 Ships in 10 - 15 working days
Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover)
Information R Management Association
R14,946 Discovery Miles 149 460 Ships in 10 - 15 working days
Modern Cryptography - Current Challenges and Solutions (Hardcover): Menachem Domb Modern Cryptography - Current Challenges and Solutions (Hardcover)
Menachem Domb
R3,536 R3,301 Discovery Miles 33 010 Save R235 (7%) Ships in 10 - 15 working days
Amazon CloudWatch Logs User Guide (Hardcover): Documentation Team Amazon CloudWatch Logs User Guide (Hardcover)
Documentation Team
R1,216 Discovery Miles 12 160 Ships in 10 - 15 working days
AWS Encryption SDK Developer Guide (Hardcover): Documentation Team AWS Encryption SDK Developer Guide (Hardcover)
Documentation Team
R952 Discovery Miles 9 520 Ships in 10 - 15 working days
Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R14,953 Discovery Miles 149 530 Ships in 10 - 15 working days
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,754 Discovery Miles 57 540 Ships in 12 - 17 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

AWS Secrets Manager User Guide (Hardcover): Documentation Team AWS Secrets Manager User Guide (Hardcover)
Documentation Team
R1,235 Discovery Miles 12 350 Ships in 10 - 15 working days
Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover): Veljko Milutinovic, Milos Kotlar Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover)
Veljko Milutinovic, Milos Kotlar
R10,065 Discovery Miles 100 650 Ships in 10 - 15 working days

As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing.

Impact of Digital Transformation on Security Policies and Standards (Hardcover): Sam Goundar, S. Bharath Bhushan, Vaishali... Impact of Digital Transformation on Security Policies and Standards (Hardcover)
Sam Goundar, S. Bharath Bhushan, Vaishali Ravindra Thakare
R6,416 Discovery Miles 64 160 Ships in 12 - 17 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Smart Technologies - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Smart Technologies - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R9,163 Discovery Miles 91 630 Ships in 10 - 15 working days

Ongoing advancements in modern technology have led to significant developments with smart technologies. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Smart Technologies: Breakthroughs in Research and Practice provides comprehensive and interdisciplinary research on the most emerging areas of information science and technology. Including innovative studies on image and speech recognition, human-computer interface, and wireless technologies, this multi-volume book is an ideal source for researchers, academicians, practitioners, and students interested in advanced technological applications and developments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,153 Discovery Miles 11 530
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,960 Discovery Miles 49 600
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,414 Discovery Miles 64 140
Blockchain Technology in Corporate…
K Sood Hardcover R4,366 Discovery Miles 43 660
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,949 R6,415 Discovery Miles 64 150
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,689 Discovery Miles 66 890
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Handbook of Research on Digital…
Ana Pego Hardcover R8,375 Discovery Miles 83 750
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,066 Discovery Miles 10 660

 

Partners