0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (335)
  • R250 - R500 (871)
  • R500+ (14,061)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover):... Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover)
Ravi Das
R3,295 Discovery Miles 32 950 Ships in 12 - 17 working days

The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.

The Tactile Internet (Hardcover): T Ali-Yahiya The Tactile Internet (Hardcover)
T Ali-Yahiya
R4,094 R3,811 Discovery Miles 38 110 Save R283 (7%) Ships in 12 - 17 working days

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet. As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed. Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.

Network Management and Control - Volume 2 (Hardcover, 1994 ed.): I. T. Frisch, Manu Malek, S.S. Panwar Network Management and Control - Volume 2 (Hardcover, 1994 ed.)
I. T. Frisch, Manu Malek, S.S. Panwar
R4,564 Discovery Miles 45 640 Ships in 12 - 17 working days

Three speakers at the Second Workshop on Network Management and Control nostalgically remembered the INTEROP Conference at which SNMP was able to interface even to CD players and toasters. We agreed this was indeed a major step forward in standards, but wondered if anyone noticed whether the toast was burned, let alone, would want to eat it. The assurance of the correct operation of practical systems under difficult environments emerged as the dominant theme of the workshop with growth, interoperability, performance, and scalability as the primary sub-themes. Perhaps this thrust is un surprising, since about half the 100 or so attendees were from industry, with a strong contingency of users. Indeed the technical program co-chairs, Shivendra Panwar of Polytechnic and Walter Johnston of NYNEX, took as their assignment the coverage of real problems and opportunities in industry. Nevertheless we take it as a real indication of progress in the field that the community is beginning to take for granted the availability of standards and even the ability to detect physical, link, and network-level faults and is now expecting diagnostics at higher levels as well as system-wide solutions.

Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Paperback): Pethuru Raj, Anupama C. Raman,... Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Paperback)
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
R2,330 Discovery Miles 23 300 Ships in 9 - 15 working days

The Internet of Things (IoT) concept is defined as a flexible and futuristic network where all the different types of devices and smart objects can become seamlessly connected to each other and can actively participate in all types of processes which are happening around us. The grand objective of making physical, mechanical, electrical, and electronic devices to use the deeper and extreme connectivity and service-enablement techniques is to make them intelligent in their deeds, decisions, and deals. Cognitive IoT is the application of cognitive computing technologies to the data which is generated by the connected devices of the IoT ecosystem. Cognition means thinking; however, computers are not yet fully capable of mimicking human like thought. However, the present-day computer systems can perform some functions which are like the capability of human beings to think. Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases explains the concepts surrounding Cognitive IoT. It also looks at the use cases and such supporting technologies as artificial intelligence and machine learning that act as key enablers of Cognitive IoT ecosystem. Different Cognitive IoT enabled platforms like IBM Watson and other product specific use cases like Amazon Alexa are covered in depth. Other highlights of the book include: Demystifying the cognitive computing paradigm Delineating the key capabilities of cognitive cloud environments Deep learning algorithms for cognitive IoT solutions Natural language processing (NLP) methods for cognitive IoT systems Designing a secure infrastructure for cognitive IoT platforms and applications

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover): Jinhui Zhang, Yuanqing Xia, Zhongqi... Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover)
Jinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen
R2,341 Discovery Miles 23 410 Ships in 12 - 17 working days

The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.

Intelligent System Algorithms and Applications in Science and Technology (Hardcover): Sunil Pathak, Pramod Kumar Bhatt, Sanjay... Intelligent System Algorithms and Applications in Science and Technology (Hardcover)
Sunil Pathak, Pramod Kumar Bhatt, Sanjay Kumar Singh, Ashutosh Tripathi, Pankaj Kumar Pandey
R4,135 Discovery Miles 41 350 Ships in 12 - 17 working days

The volume addresses a selection of diverse topics in such areas as: machine learning based intelligent systems for healthcare applications of artificial intelligence the Internet of Things, intelligent data analytics techniques, intelligent network systems and applications, and inequalities and process control systems.

Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover):... Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover)
Charlette Donalds, Corlane Barclay, Kweku-Muata Osei-Bryson
R3,163 Discovery Miles 31 630 Ships in 12 - 17 working days

The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users. However, It cannot be overlooked that with increasing connectivity to and dependence on Internet-based platforms and services, so too is the potential increased for information and cybersecurity threats and attacks. Further, it has long been established that micro, small, and medium enterprises (MSMEs) play a key role in national economies, serving as important drivers of economic growth in Global South economies. Yet, little is known about information security, cybersecurity and cybercrime issues and strategies contextualized to these developing economies and MSMEs. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience examines the prevalence, nature, trends and impacts of cyber-related incidents on Global South economies. It further explores cybersecurity challenges, potential threats, and risks likely faced by MSMEs and governments of the Global South. A major thrust of this book is to offer tools, techniques, and legislative frameworks that can improve the information, data, and cybersecurity posture of Global South governments and MSMEs. It also provides evidence-based best practices and strategies relevant to the business community and general Information Communication Technology (ICT) users in combating and preventing cyber-related incidents. Also examined in this book are case studies and experiences of the Global South economies that can be used to enhance students' learning experience. Another important feature of this book is that it outlines a research agenda to advance the scholarship of information and cybersecurity in the Global South. Features: Cybercrime in the Caribbean Privacy and security management Cybersecurity compliance behaviour Developing solutions for managing cybersecurity risks Designing an effective cybersecurity programme in the organization for improved resilience The cybersecurity capability maturity model for sustainable security advantage Cyber hygiene practices for MSMEs A cybercrime classification ontology

Socioeconomic and Legal Implications of Electronic Intrusion (Hardcover): Dionysios Politis Socioeconomic and Legal Implications of Electronic Intrusion (Hardcover)
Dionysios Politis
R5,307 Discovery Miles 53 070 Ships in 12 - 17 working days

In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. ""Socioeconomic and Legal Implications of Electronic Intrusion"" focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source within the field, this book provides legal and political practitioners, academicians, and intrusion researchers with expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime issues.

Marx and the Robots - Networked Production, AI and Human Labour (Hardcover): Florian Butollo, Sabine Nuss Marx and the Robots - Networked Production, AI and Human Labour (Hardcover)
Florian Butollo, Sabine Nuss; Translated by Jan-Peter Herrmann
R2,923 R2,048 Discovery Miles 20 480 Save R875 (30%) Ships in 12 - 17 working days

Marxist discourse around automation has recently become waylaid with breathless techno-pessimist dystopias and fanciful imaginations of automated luxury communism. This collection of essays by both established veterans of the field and new voices is a refreshingly sober materialist reflection on recent technological developments within capitalist production. It covers a broad range of digital aspects now proliferating across our work and lives, including chapters on the digitalisation of agriculture, robotics in the factory and the labour process on crowdworking platforms. It looks to how 20th century Marxist predictions of the 'workerless factory' are, or are not, coming true, and how 'Platform Capitalism' should be understood and critiqued. Through rich empirical, theoretical and historical material, this book is necessary reading for those wanting a clear overview of our digital world.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,290 Discovery Miles 32 900 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

IoT Security Paradigms and Applications - Research and Practices (Paperback): Sudhir Kumar Sharma, Bharat Bhushan, Narayan C... IoT Security Paradigms and Applications - Research and Practices (Paperback)
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C Debnath
R1,786 Discovery Miles 17 860 Ships in 12 - 17 working days

Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment

Mathematical Foundations of Computer Networking (Paperback): Srinivasan Keshav Mathematical Foundations of Computer Networking (Paperback)
Srinivasan Keshav
R2,667 R1,643 Discovery Miles 16 430 Save R1,024 (38%) Ships in 12 - 17 working days

"To design future networks that are worthy of society's trust, we must put the 'discipline' of computer networking on a much stronger foundation. This book rises above the considerable minutiae of today's networking technologies to emphasize the long-standing mathematical underpinnings of the field." -Professor Jennifer Rexford, Department of Computer Science, Princeton University "This book is exactly the one I have been waiting for the last couple of years. Recently, I decided most students were already very familiar with the way the net works but were not being taught the fundamentals-the math. This book contains the knowledge for people who will create and understand future communications systems." -Professor Jon Crowcroft, The Computer Laboratory, University of Cambridge The Essential Mathematical Principles Required to Design, Implement, or Evaluate Advanced Computer Networks Students, researchers, and professionals in computer networking require a firm conceptual understanding of its foundations. Mathematical Foundations of Computer Networking provides an intuitive yet rigorous introduction to these essential mathematical principles and techniques. Assuming a basic grasp of calculus, this book offers sufficient detail to serve as the only reference many readers will need. Each concept is described in four ways: intuitively; using appropriate mathematical notation; with a numerical example carefully chosen for its relevance to networking; and with a numerical exercise for the reader. The first part of the text presents basic concepts, and the second part introduces four theories in a progression that has been designed to gradually deepen readers' understanding. Within each part, chapters are as self-contained as possible. The first part covers probability; statistics; linear algebra; optimization; and signals, systems, and transforms. Topics range from Bayesian networks to hypothesis testing, and eigenvalue computation to Fourier transforms. These preliminary chapters establish a basis for the four theories covered in the second part of the book: queueing theory, game theory, control theory, and information theory. The second part also demonstrates how mathematical concepts can be applied to issues such as contention for limited resources, and the optimization of network responsiveness, stability, and throughput.

Economic and Business Management (Hardcover): Xiaoxia Huang, Feng Zhang Economic and Business Management (Hardcover)
Xiaoxia Huang, Feng Zhang
R4,456 Discovery Miles 44 560 Ships in 12 - 17 working days

With the rapid development and drastic change of the world economy, "Digital Finance", "Internet Finance", "Science and Technology Finance" have become new hotspots, which also represent the future trend of economy development in the era of big data. Enterprises are facing more uncertainty, opportunities coexist with challenges. There are more possibilities for economic development and enterprise management to accelerate the integration of cutting-edge research results, to deepen hot topics discussion and to promote opinion exchanges among academic and business circles. The Sixth International Conference on Economic and Business Management (FEBM2021) was successfully held online on October 16-17, 2021, and aimed to provide a platform for researchers, engineers, academics as well as industry professionals from all over the world to present their latest research findings and development activities in economic and business management. These proceedings include 51 accepted articles selected from 94 submissions.

Principles of Information Security (Paperback, 7th edition): Herbert Mattord, Michael Whitman Principles of Information Security (Paperback, 7th edition)
Herbert Mattord, Michael Whitman
R1,278 R1,193 Discovery Miles 11 930 Save R85 (7%) Ships in 10 - 15 working days

Discover the latest trends, developments and technology in information security with Whitman/Mattord's market-leading PRINCIPLES OF INFORMATION SECURITY, 7th Edition. Designed specifically to meet the needs of information systems students like you, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective. This overview explores important terms and examines what is needed to manage an effective information security program. A new module details incident response and detection strategies. In addition, current, relevant updates highlight the latest practices in security operations as well as legislative issues, information management toolsets, digital forensics and the most recent policies and guidelines that correspond to federal and international standards. MindTap digital resources offer interactive content to further strength your success as a business decision-maker.

Enterprise Agility - A Practical Guide to Agile Business Management (Paperback): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Paperback)
Gizem Ozbayrac
R1,400 Discovery Miles 14 000 Ships in 12 - 17 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover)
Gizem Ozbayrac
R3,285 Discovery Miles 32 850 Ships in 12 - 17 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

An Introduction to the DLNA (R) Architecture - Network Technologies for Media Devices (Hardcover): EA Heredia An Introduction to the DLNA (R) Architecture - Network Technologies for Media Devices (Hardcover)
EA Heredia
R2,905 Discovery Miles 29 050 Ships in 12 - 17 working days

This book describes the architecture and protocols for interconnecting media devices in home networks. The architecture and protocols described in this book have been developed during the last 10 years by R&D teams from several companies working jointly in two industry organizations known as UPnP and DLNA. This book mainly deals with the DLNA (Digital Living Network Alliance) protocol. This text is especially relevant for the design and development of smart homes, where media devices, communication devices, appliances, and sensors are all integrated in an intelligent network.

Mobile Clouds - Exploiting Distributed Resources in Wireless, Mobile and Social Networks (Hardcover): FHP Fitzek Mobile Clouds - Exploiting Distributed Resources in Wireless, Mobile and Social Networks (Hardcover)
FHP Fitzek
R2,262 Discovery Miles 22 620 Ships in 12 - 17 working days

Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, "UCLA, USA"

This book discusses and explores the concept of "mobile cloud," creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas.

A "mobile cloud "is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for "mobile clouds "are also discussed, highlighting the key role of network coding. "Mobile clouds "have the potential to enhance communications performance, improve utilization of resources and create flexible platforms to share resources in very novel ways.

Energy efficient aspects of "mobile clouds "are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple examples of "mobile" "clouds "applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept of resource sharing takes a wider and deeper meaning, creating the foundations for a global real-time multidimensional resource pool, the underlying infrastructure for shareconomy. Above all, this is an inspiring book for anyone who is concerned about the future of wireless and mobile communications networks and their relationship with Social networks.

Key Features: Provides fundamental ideas and promising concepts for exploiting opportunistic cooperation and cognition in wireless and mobile networksGives clear definitions of "mobile clouds "from different perspectivesAssociates mobile and wireless networks with social networks, creating a vast fertile ground for novel developments in both research and practical applicationsConsiders research directions, emerging trends and visions

This book is an excellent resource for wireless/networking researchers in industry and academia, students and mobile phone programmers. Managers interested in new technology developments, service providers, network operators, and those working in the gaming industry will also find the book insightful.

VoIP - Wireless P2P and New Enterprise Voice Over IP (Hardcover): S. Ganguly VoIP - Wireless P2P and New Enterprise Voice Over IP (Hardcover)
S. Ganguly
R2,576 Discovery Miles 25 760 Ships in 12 - 17 working days

Voice over Internet Protocol (VoIP) is revolutionizing the way people communicate - both in the corporate world and in personal life. The enormous success of VoIP has led to its adoption in a wide range of networking technologies. Each network technology has its unique features and poses distinct challenges to the performance of VoIP.

VoIP: Wireless, P2P and New Enterprise Voice over IP describes the issues arising in the deployment of VoIP in an emerging heterogeneous network environment. Along with a brief overview of the concepts, protocols, algorithms, and equipment involved in realizing VoIP, this book focuses on two areas; quality and performance issues in deploying VoIP, this book focuses on two areas: quality and performance issues in deploying VoIP over various network settings, and the new mechanisms and protocols in these emerging networks to assist the deployment of VoIP.

This book is an invaluable resource for professional network engineers, designers, managers, researchers, decision makers and project managers overseeing VoIP implementations. Market analysts, consultants, and those studying advanced undergraduate and graduate courses on data, voice and multimedia communications will also find this book insightful.

VoIP; Wireless, P2P and New Enterprise Voice over IP: Discusses the basics of VoIP, VoIP codecs and VoIP protocols including SIP and H.323. Details new technologies such as P2P technology, VoWiFi, WiMax, and 3G networks. Explains the QoS issues arising from deploying VoIP using the new technologies. Solves the performance issues that emerge when VoIP is deployed over different network technologies.

Smart Innovation of Web of Things (Paperback): Aarti Jain, Ruben Gonzalez Crespo, Manju Khari Smart Innovation of Web of Things (Paperback)
Aarti Jain, Ruben Gonzalez Crespo, Manju Khari
R3,859 Discovery Miles 38 590 Ships in 12 - 17 working days

The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.

Cloud Computing Solutions Architect - A Hands-On Approach: A Competency-based Textbook for Universities and a Guide for AWS... Cloud Computing Solutions Architect - A Hands-On Approach: A Competency-based Textbook for Universities and a Guide for AWS Cloud Certification and Beyond (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R2,491 Discovery Miles 24 910 Ships in 10 - 15 working days
Security and its Challenges in the 21st Century (Hardcover): C Guerrier Security and its Challenges in the 21st Century (Hardcover)
C Guerrier
R4,098 R3,814 Discovery Miles 38 140 Save R284 (7%) Ships in 12 - 17 working days

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R5,740 Discovery Miles 57 400 Ships in 12 - 17 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Applications of Artificial Intelligence in Business and Finance - Modern Trends (Hardcover): Vikas Garg, Shalini Aggarwal,... Applications of Artificial Intelligence in Business and Finance - Modern Trends (Hardcover)
Vikas Garg, Shalini Aggarwal, Pooja Tiwari, Prasenjit Chatterjee
R3,898 Discovery Miles 38 980 Ships in 12 - 17 working days

As transactions and other business functions move online and grow more popular every year, the finance and banking industries face increasingly complex data management and identity theft and fraud issues. AI can bring many financial and business functions to the next level, as systems using deep learning technologies are able to analyze patterns and spot suspicious behavior and potential fraud. In this volume, the focus is on the application of artificial intelligence in finance, business, and related areas. The book presents a selection of chapters presenting cutting-edge research on current business practices in finance and management. Topics cover the use of AI in e-commerce systems, financial services, fraud prevention, identifying loan-eligible customers, online business, Facebook social commerce, insurance industry, online marketing, and more.

Inclusive Development of Society - Proceedings of the 6th International Conference on Management and Technology in Knowledge,... Inclusive Development of Society - Proceedings of the 6th International Conference on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018) (Paperback)
Natalia Filimonova, Irina Frolova, Ford Lumban Gaol, Ignatova Vladimirovna
R2,119 Discovery Miles 21 190 Ships in 12 - 17 working days

Inclusive Development of Society contains papers that were originally presented at the 2018 International Congress on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018), held 6-7 October and 15-16 December 2018 in Kuta, Bali, Indonesia and 18-19 October, 2018 at The Southern Federal University, Rostov-on-don, Russia. The contributions deal with various interdisciplinary research topics, particularly in the fields of social sciences, economics and the arts. The papers focus especially on such topics as language, cultural studies, economics, behavior studies, political sciences, media and communication, psychology and human development. The theoretical research studies included here should provide a solid foundation for the development of new tools that explore the possibilities of developing tourism, hospitality, service industries in Knowledge Economic Era, and the empirical papers will advance our knowledge regarding the impact of information technologies in organizations' and institutions' practices. These proceedings should be of interest to academics and professionals in the wider field of social sciences, including disciplines such as education, psychology, tourism and knowledge management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Plotinus on Eudaimonia - A Commentary on…
Kieran McGroarty Hardcover R3,559 Discovery Miles 35 590
Kitchen Medicine - How I Fed My Daughter…
Debi Lewis Hardcover R751 Discovery Miles 7 510
Conservation - Economics, Science, and…
Charles Perrings, Ann Kinzig Hardcover R4,309 Discovery Miles 43 090
Clinical Allergy and Asthma Management…
Ravindran Chetambath, Venugopal Panicker Hardcover R6,329 Discovery Miles 63 290
Swimming Lessons - Keeping Afloat in the…
David Ehrenfeld Hardcover R745 Discovery Miles 7 450
Homewaters - A Human and Natural History…
David B. Williams Paperback R499 Discovery Miles 4 990
Handbook of Property Estimation Methods…
Donald MacKay, Robert S. Boethling Hardcover R5,350 Discovery Miles 53 500
Wild by Design - The Rise of Ecological…
Laura J. Martin Hardcover R1,094 R907 Discovery Miles 9 070
Juvenile Justice - An Introduction
John T Whitehead, Steven P Lab Paperback R2,701 Discovery Miles 27 010
The Handbook of Natural Resources…
Yeqiao Wang Mixed media product R8,775 Discovery Miles 87 750

 

Partners