0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,566)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computer Viruses and Malware (Hardcover, 2006 ed.): John Aycock Computer Viruses and Malware (Hardcover, 2006 ed.)
John Aycock
R3,458 Discovery Miles 34 580 Ships in 18 - 22 working days

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.

Advancing Cloud Database Systems and Capacity Planning with Dynamic Applications (Hardcover): Narendra Kumar Kamila Advancing Cloud Database Systems and Capacity Planning with Dynamic Applications (Hardcover)
Narendra Kumar Kamila
R5,342 Discovery Miles 53 420 Ships in 18 - 22 working days

Continuous improvements in data analysis and cloud computing have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Advancing Cloud Database Systems and Capacity Planning with Dynamic Applications is a key resource on the latest innovations in cloud database systems and their impact on the daily lives of people in modern society. Highlighting multidisciplinary studies on information storage and retrieval, big data architectures, and artificial intelligence, this publication is an ideal reference source for academicians, researchers, scientists, advanced level students, technology developers and IT officials.

Resource Management for Distributed Multimedia Systems (Hardcover, 1996 ed.): Lars Christian Wolf Resource Management for Distributed Multimedia Systems (Hardcover, 1996 ed.)
Lars Christian Wolf
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

Resource Management for Distributed Multimedia Systems addresses the problems and challenges of handling several continuous- media data streams in networked multimedia environments. The work demonstrates how resource management mechanisms can be integrated into a stream handling system. The resulting system includes functions for Quality of Service (QoS) calculations, scheduling, determination of resource requirements, and methods to reduce resource requirements. The work explains the following: a suitable system architecture and resource management scheme that allows for the provision and enforcement of QoS guarantee, resource scheduling mechanisms for CPU and buffer space, mechanisms to measure and collect resource requirements, methods to extend resource management to future scenarios by allowing the reservation of resources in advance and offering sealing mechanisms. . Resource Management for Distributed Multimedia Systems is a comprehensive view of resource management for a broad technical audience that includes computer scientists and engineers involved in developing multimedia applications.

Cyber Security of Industrial Control Systems in the Future Internet Environment (Hardcover): Mirjana D. Stojanovic, Slavica V.... Cyber Security of Industrial Control Systems in the Future Internet Environment (Hardcover)
Mirjana D. Stojanovic, Slavica V. Bostjancic Rakas
R5,363 Discovery Miles 53 630 Ships in 18 - 22 working days

In today's modernized market, many fields are utilizing internet technologies in their everyday methods of operation. The industrial sector is no different as these technological solutions have provided several benefits including reduction of costs, scalability, and efficiency improvements. Despite this, cyber security remains a crucial risk factor in industrial control systems. The same public and corporate solutions do not apply to this specific district because these security issues are more complex and intensive. Research is needed that explores new risk assessment methods and security mechanisms that professionals can apply to their modern technological procedures. Cyber Security of Industrial Control Systems in the Future Internet Environment is a pivotal reference source that provides vital research on current security risks in critical infrastructure schemes with the implementation of information and communication technologies. While highlighting topics such as intrusion detection systems, forensic challenges, and smart grids, this publication explores specific security solutions within industrial sectors that have begun applying internet technologies to their current methods of operation. This book is ideally designed for researchers, system engineers, managers, networkers, IT professionals, analysts, academicians, and students seeking a better understanding of the key issues within securing industrial control systems that utilize internet technologies.

Formal Correctness of Security Protocols (Hardcover, 2007 ed.): Giampaolo Bella Formal Correctness of Security Protocols (Hardcover, 2007 ed.)
Giampaolo Bella
R1,563 Discovery Miles 15 630 Ships in 18 - 22 working days

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.

Intelligent Distributed Computing VIII (Hardcover, 2015 ed.): David Camacho, Lars Braubach, Salvatore Venticinque, Costin Badica Intelligent Distributed Computing VIII (Hardcover, 2015 ed.)
David Camacho, Lars Braubach, Salvatore Venticinque, Costin Badica
R5,495 R4,903 Discovery Miles 49 030 Save R592 (11%) Ships in 10 - 15 working days

This book represents the combined peer-reviewed proceedings of the Eight International Symposium on Intelligent Distributed Computing - IDC'2014, of the Workshop on Cyber Security and Resilience of Large-Scale Systems - WSRL-2014, and of the Sixth International Workshop on Multi-Agent Systems Technology and Semantics- MASTS-2014. All the events were held in Madrid, Spain, during September 3-5, 2014. The 47 contributions published in this book address several topics related to theory and applications of the intelligent distributed computing and multi-agent systems, including: agent-based data processing, ambient intelligence, collaborative systems, cryptography and security, distributed algorithms, grid and cloud computing, information extraction, knowledge management, big data and ontologies, social networks, swarm intelligence or videogames amongst others.

Security and Quality in Cyber-Physical Systems Engineering - With Forewords by Robert M. Lee and Tom Gilb (Hardcover, 1st ed.... Security and Quality in Cyber-Physical Systems Engineering - With Forewords by Robert M. Lee and Tom Gilb (Hardcover, 1st ed. 2019)
Stefan Biffl, Matthias Eckhart, Arndt Luder, Edgar Weippl
R3,698 Discovery Miles 36 980 Ships in 10 - 15 working days

This book examines the requirements, risks, and solutions to improve the security and quality of complex cyber-physical systems (C-CPS), such as production systems, power plants, and airplanes, in order to ascertain whether it is possible to protect engineering organizations against cyber threats and to ensure engineering project quality. The book consists of three parts that logically build upon each other. Part I "Product Engineering of Complex Cyber-Physical Systems" discusses the structure and behavior of engineering organizations producing complex cyber-physical systems, providing insights into processes and engineering activities, and highlighting the requirements and border conditions for secure and high-quality engineering. Part II "Engineering Quality Improvement" addresses quality improvements with a focus on engineering data generation, exchange, aggregation, and use within an engineering organization, and the need for proper data modeling and engineering-result validation. Lastly, Part III "Engineering Security Improvement" considers security aspects concerning C-CPS engineering, including engineering organizations' security assessments and engineering data management, security concepts and technologies that may be leveraged to mitigate the manipulation of engineering data, as well as design and run-time aspects of secure complex cyber-physical systems. The book is intended for several target groups: it enables computer scientists to identify research issues related to the development of new methods, architectures, and technologies for improving quality and security in multi-disciplinary engineering, pushing forward the current state of the art. It also allows researchers involved in the engineering of C-CPS to gain a better understanding of the challenges and requirements of multi-disciplinary engineering that will guide them in their future research and development activities. Lastly, it offers practicing engineers and managers with engineering backgrounds insights into the benefits and limitations of applicable methods, architectures, and technologies for selected use cases.

Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover): Rebecca Herold, Marcus K. Rogers Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover)
Rebecca Herold, Marcus K. Rogers
R39,414 Discovery Miles 394 140 Ships in 10 - 15 working days

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia's four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available OnlineThis Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]

Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition): R. Anderson, J. D Dewar Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition)
R. Anderson, J. D Dewar; Edited by Harold F. Tipton
R2,283 Discovery Miles 22 830 Ships in 10 - 15 working days

The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)(2) CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)(2) certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Networking in Japanese Factory Automation (Hardcover): Koichi Kishimoto Networking in Japanese Factory Automation (Hardcover)
Koichi Kishimoto
R4,482 Discovery Miles 44 820 Ships in 10 - 15 working days

In Japan information technology has been a vital part of manufacturing for decades. A central factory computer provides a production plan and shop minicomputers and microcomputers in the factory run machines that manufacture products. It has become necessary to connect computers installed at different locations to enable information exchange between different sections. This requires an intracompany network with large memory capacity and high-speed communication capability to process documents, drawings, and image data, as well as conventional code data: a local area network (LAN). This volume discusses the ring-type LAN; the TOSLINE-8000 high-speed optical data highway for high-speed real-time control systems; the TOSLINE-2000E, a compact, low-cost independent local area network; the status of MAP, a communications protocol for manufacturing automation established by General Motors and MAP activities in Japan

Communications Technology Guide for Business (Hardcover): Richard Downey, Etc, Sean Boland, Philip Walsh Communications Technology Guide for Business (Hardcover)
Richard Downey, Etc, Sean Boland, Philip Walsh
R3,157 Discovery Miles 31 570 Ships in 18 - 22 working days

Here's a broad, integrated view of existing communications technologies available world-wide -- including the Internet and Web, digital mobile telephony, ISDN, SMDS, frame relay, and ATM -- from a practical business perspective. Covering both private and public networks, the book offers a basic explanation of a wide range of technologies and describes their underlying principles and features, as well as the factors that differentiate them. The guide also showcases typical applications, exposes inherent limitations, explains pricing and methods of comparison, and discusses security pitfalls and protection systems.

Towards an Optical Internet - New Visions in Optical Network Design and Modelling. IFIP TC6 Fifth Working Conference on Optical... Towards an Optical Internet - New Visions in Optical Network Design and Modelling. IFIP TC6 Fifth Working Conference on Optical Network Design and Modelling (ONDM 2001) February 5-7, 2001, Vienna, Austria (Hardcover, 2002 ed.)
Admela Jukan
R4,231 Discovery Miles 42 310 Ships in 18 - 22 working days

In these exciting times of quotidianly progressing developments in communication techniques, where more than ever in the history of a technological progress, society's reliance on communication networks for medicine, education, data transfer, commerce, and many other endeavours dominates the human's everyday life, the optical networks are certainly one of the most promising and challenging networking options. Since their commercial arrival in the nineties, they have fundamentally changed the way of dealing with traffic engineering by removing bandwidth bottlenecks and eliminating delays. Today, after the revolutionary bandwidth expansion, the networking functionality migrates more and more to the optical layer, and the need to establish fast wavelength circuits and capacity-on-demand for the higher-layer networks, in particular data networks based on Internet Protocol (IP), has become one of the central networking issues for the new century. The unifying trends toward configurable all-optical network infrastructure open up a wide range of new network engineering and design choices dealing with networks' interoperability and common platforms for control and management. The Fifth Working Conference on Optical Network Design and Modelling, held in the Austrian capital Vienna, February 5-7, 2001, aims at presenting the most recent progress in optical communication techniques, new technologies, standardisation process, emerging markets and carriers. A short look at the Table of Contents of this book tells us, in fact, that this year's conference program reflects the current state of the art precisely.

Intelligent Broadband Multimedia Networks - Generic Aspects and Architectures Wireless, ISDN, Current and Future Intelligent... Intelligent Broadband Multimedia Networks - Generic Aspects and Architectures Wireless, ISDN, Current and Future Intelligent Networks (Hardcover, 1997 ed.)
Syed V. Ahamed, Victor B. Lawrence
R6,139 Discovery Miles 61 390 Ships in 18 - 22 working days

Intelligent Broadband Multimedia Networks is a non-mathematical, but highly systems oriented, coverage of modern intelligent information networks. This volume focuses on the convergence of computers and communications technologies. Most of the concepts that are generic to all intelligent networks, and their microscopic and macroscopic functions, are presented. This book includes specific architectures that can be used by network designers and planners, telecommunications managers, computer scientists, and telecommunications professionals. The breadth of this coverage and the systems orientation of this work make the text suitable for use in advanced level courses on intelligent communications networks. The material in this volume ranges from defining intelligent networks to more specific coverage of educational, medical, and knowledge-based networks. Each of the 20 chapters address issues that can help make the transition from computer design, to the underlying concepts of modern telecommunications systems, to considerations necessary for the implementation of intelligent network services. Special and timely coverage of emerging technologies, such as HDSL, ADSL, BISDN, wireless, broadband access, ATM, and other topics, are given expanded treatment. The authors have included design methodologies for installing intelligence into almost any communications systems, and procedures for using such intelligence according to the type of function expected from these networks. Unique features of the book are: a 64-page glossary of key terms (with expanded explanations) used in the field, a 23-page index that makes it easy to search for important information, running headers on each page to help the busy professional use the book as a reference/design tool, complete references including additional reading for more detailed information, and accurate and concise information to help telecommunications professionals understand the intricacies of the field.

Computer and Information Science (Hardcover, 1st ed. 2020): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2020)
Roger Lee
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

This book gathers the outcomes of the 18th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2019), which was held on June 12-14, 2019 in Beijing, China. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them. The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference's most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.

Cloud Computing Strategies (Hardcover): Dimitris N Chorafas Cloud Computing Strategies (Hardcover)
Dimitris N Chorafas
R4,233 Discovery Miles 42 330 Ships in 10 - 15 working days

A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments. Illustrated with numerous examples and case studies, the book examines security, privacy, data ownership, and data protection in the cloud. It also: Explains how and why your company can benefit from Open Software and onDemand Services Identifies various cloud providers, their services, and their content as a basis for evaluating cost effectiveness Provides authoritative guidance on how to transition from a legacy system to the cloud Includes helpful tips for managing cloud vendor relationships and avoiding vendor lock-in Whether you're already in the cloud or just considering it, the text provides the unbiased understanding of the strengths and weaknesses of cloud computing needed to make informed decisions regarding its future in your organization. The book's strength is that it supplies authoritative insight on everything needed to decide if you should make a transition to the cloud.

Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and... Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and Wireless Communications Networks, August 20-25, 2006, Santiago, Chile (Hardcover, 1992. 2nd Print)
Guy Pujolle
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has been held in a Latin American country.

Topics in this series include:

  • The 4th International Conference on Theoretical Computer Science
  • Education for the 21st Century- Impact of ICT and Digital Resources
  • Mobile and Wireless Communication Networks
  • Ad-Hoc Networking
  • Network Control and Engineering for QoS, Security, and Mobility
  • The Past and Future of Information Systems: 1976-2006 and Beyond
  • History of Computing and Education
  • Biologically Inspired Cooperative Computing
  • Artificial Intelligence in Theory and Practice
  • Applications in Artificial Intelligence
  • Advanced Software Engineering: Expanding the Frontiers of Software

For a complete list of the more than 300 titles in the IFIP Series, visit springer.com.

For more information about IFIP, please visit ifip.org.

Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback): Ivan B. Djordjevic Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback)
Ivan B. Djordjevic
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing. It starts with basic concepts from classical detection theory, information theory, and channel coding fundamentals before continuing with basic principles of quantum mechanics including state vectors, operators, density operators, measurements, and dynamics of a quantum system. It continues with fundamental principles of quantum information processing, basic quantum gates, no-cloning and theorem on indistinguishability of arbitrary quantum states. The book then focuses on quantum information theory, quantum detection and Gaussian quantum information theories, and quantum key distribution (QKD). The book then covers quantum error correction codes (QECCs) before introducing quantum networks. The book concludes with quantum sensing and quantum radars, quantum machine learning and fault-tolerant quantum error correction concepts.

Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications,... Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE (Hardcover, 1st ed. 2018)
Jihad Mohamad Alja'am, Abdulmotaleb El Saddik, Abdul Hamid Sadka
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This edited volume presents the best chapters presented during the international conference on computer and applications ICCA'17 which was held in Dubai, United Arab Emirates in September 2017. Selected chapters present new advances in digital information, communications and multimedia. Authors from different countries show and discuss their findings, propose new approaches, compare them with the existing ones and include recommendations. They address all applications of computing including (but not limited to) connected health, information security, assistive technology, edutainment and serious games, education, grid computing, transportation, social computing, natural language processing, knowledge extraction and reasoning, Arabic apps, image and pattern processing, virtual reality, cloud computing, haptics, information security, robotics, networks algorithms, web engineering, big data analytics, ontology, constraints satisfaction, cryptography and steganography, Fuzzy logic, soft computing, neural networks, artificial intelligence, biometry and bio-informatics, embedded systems, computer graphics, algorithms and optimization, Internet of things and smart cities. The book can be used by researchers and practitioners to discover the recent trends in computer applications. It opens a new horizon for research discovery works locally and internationally.

Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022):... Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022)
Vera Roos, Jaco Hoffman
R1,545 Discovery Miles 15 450 Ships in 18 - 22 working days
Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.): Ying Zhang Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.)
Ying Zhang
R7,792 Discovery Miles 77 920 Ships in 18 - 22 working days

This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises... Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises (PRO-VE'03) October 29-31, 2003, Lugano, Switzerland (Hardcover, 2004 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R2,962 Discovery Miles 29 620 Ships in 18 - 22 working days

Processes and Foundations for Virtual Organizations contains selected articles from PRO-VE'03, the Fourth Working Conference on Virtual Enterprises, which was sponsored by the International Federation for Information Processing (IFIP) and held in Lugano, Switzerland in October 2003. This fourth edition includes a rich set of papers revealing the progress and achievements in the main current focus areas:

-VO breeding environments;
-Formation of collaborative networked organizations;
-Ontologies and knowledge management;
-Process models and interoperability;
-Infrastructures;
-Multi-agent approaches. In spite of many valid contributions in these areas, many research challenges remain. This is clearly stated in a number of papers suggesting a new research agenda and strategic research roadmaps for advanced virtual organizations.
With the selected papers included in this book, PRO-VE pursues its double mission as a forum for presentation and discussion of achievements as well as a place to discuss and suggest new directions and research strategies.

Distributed Services with OpenAFS - for Enterprise and Education (Hardcover, 2007 ed.): Franco Milicchio, Wolfgang Alexander... Distributed Services with OpenAFS - for Enterprise and Education (Hardcover, 2007 ed.)
Franco Milicchio, Wolfgang Alexander Gehrke
R1,467 Discovery Miles 14 670 Ships in 18 - 22 working days

This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.

Agile Web Development with Rails 7 (Paperback): Sam Ruby Agile Web Development with Rails 7 (Paperback)
Sam Ruby
R1,151 Discovery Miles 11 510 Ships in 10 - 15 working days

Rails 7 completely redefines what it means to produce fantastic user experiences and provides a way to achieve all the benefits of single-page applications - at a fraction of the complexity. Rails 7 integrates the Hotwire frameworks of Stimulus and Turbo directly as the new defaults, together with that hot newness of import maps. The result is a toolkit so powerful that it allows a single individual to create modern applications upon which they can build a competitive business. The way it used to be. Ruby on Rails helps you produce high-quality, beautiful-looking web applications quickly - you concentrate on creating the application, and Rails takes care of the details. Rails 7 brings many improvements, and this edition is updated to cover the new features and changes in best practices. We start with a step-by-step walkthrough of building a real application, and in-depth chapters look at the built-in Rails features. Follow along with an extended tutorial as you write a web-based store application. Eliminate tedious configuration and housekeeping, seamlessly incorporate JavaScript, send and receive emails, manage background jobs with ActiveJob, and build real-time features using WebSockets and ActionCable. Test your applications as you write them using the built-in unit, integration, and system testing frameworks, internationalize your applications, and deploy your applications easily and securely. Rails 1.0 was released in December 2005. This book was there from the start, and didn't just evolve alongside Rails, it evolved with Rails. It has been developed in consultation with the Rails core team. In fact, Rails itself is tested against the code in this book. What You Need: All you need is a Windows, Mac OS X, or Linux machine to do development on. This book will take you through the steps to install Rails and its dependencies. If you aren't familiar with the Ruby programming language, this book contains a chapter that covers the basics necessary to understand the material in the book.

Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.): Hanane Fathi, Shyam... Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.)
Hanane Fathi, Shyam S. Chakraborty, Ramjee Prasad
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

karmano hy api boddhavyam boddhavyam ca vikarmanah akarmanas ca boddhavyam gahana karmano gatih The intricacies of action are very hard to understand. Therefore one should know properly what action is, what forbidden action is, and what inaction is. The Bhagvad Gita (4.17) This book is the outcome of the research contribution of Hanane Fathi towards her Ph.D. studies jointly with Shyam S. Chakraborty and Ramjee Prasad as - pervisors. To the best of the authors' knowledge, this is a ?rst book on voice over Internet protocol (VoIP) covering such a broad perspective as illustrated in Figure P.1. This book is a new, forward-looking resource that explores the present and future trends of VoIP in the wireless heterogeneous networks. This book also provides the discovery path that these network infrastructures are following from a perspective of synergies with the present systems and how they will pave the way for future systems. This book is intended for everyone in the ?eld of wireless information and multimedia communications. It provides different levels of material suitable for managers, researchers, network providers, and graduate students. We hope that all readers will experience the bene?ts and power of this knowledge. We have tried our best to make each chapter comprehensive and we cannot claim that this book is without errors. Any remarks to improve the text and correct the errors would be highly appreciated.

Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.): Stefan Axelsson, David Sands Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.)
Stefan Axelsson, David Sands
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection Through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Cybersecurity for Connected Medical…
Arnab Ray Paperback R2,061 Discovery Miles 20 610
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
Network Science - Analysis and…
CAR Pinheiro Hardcover R2,245 Discovery Miles 22 450
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520

 

Partners