0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (858)
  • R500+ (13,719)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Mastering VMware NSX for vSphere (Paperback): ES Sena Sosa Mastering VMware NSX for vSphere (Paperback)
ES Sena Sosa
R1,304 R1,082 Discovery Miles 10 820 Save R222 (17%) Ships in 18 - 22 working days

A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.

Scalable Network Monitoring in High Speed Networks (Hardcover, 2011 ed.): Baek-Young Choi, Zhi-Li Zhang, David Hung-Chang Du Scalable Network Monitoring in High Speed Networks (Hardcover, 2011 ed.)
Baek-Young Choi, Zhi-Li Zhang, David Hung-Chang Du
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.

Teletraffic Technologies in ATM Networks (Hardcover): Hiroshi Saito Teletraffic Technologies in ATM Networks (Hardcover)
Hiroshi Saito
R2,985 Discovery Miles 29 850 Ships in 18 - 22 working days

This work surveys the various switching technologies, shows how to evaluate the performance of ATM networks and enables the reader to implement teletraffic control via connection admission control (CAC) and other traffic control methods. The text introduces the non-parametric approach for CAC and dimensioning and offers the hybrid CAC as an alternative solution to traffic control.

Mobile Peer-to-peer Computing for Next Generation Distributed Environments - Advancing Conceptual and Algorithmic Applications... Mobile Peer-to-peer Computing for Next Generation Distributed Environments - Advancing Conceptual and Algorithmic Applications (Hardcover)
Boon-Chong Seet
R5,026 Discovery Miles 50 260 Ships in 18 - 22 working days

Peer-to-peer computing has gained significant attention from both industry and research communities in the past decade as the number of users worldwide continues to grow along with demand for mobile computing. Mobile Peer-to-Peer Computing for Next Generation Distributed Environments: Advancing Conceptual and Algorithmic Applications focuses on current research and innovation in mobile and wireless technologies that address challenges from both a theoretical and applied perspective. This advanced publication provides researchers, practitioners, and academicians with an authoritative reference source to the latest state-of-the-art developments in this growing technology field.

Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.): Salvatore J Stolfo, Steven M. Bellovin, Shlomo... Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Social Dimensions of Information and Communication Technology Policy - Proceedings of the Eighth International Conference on... Social Dimensions of Information and Communication Technology Policy - Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008 (Hardcover, 2008 ed.)
Chrisanthi Avgerou, Matthew L. Smith, Peter Van den Besselaar
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Human Choice and Computers (HCC8), IFIP TC9, held in Pretoria, South Africa on September 25-26, 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Streaming Media with Peer-to-Peer Networks - Wireless Perspectives (Hardcover, New): Martin Fleury, Nadia Qadri Streaming Media with Peer-to-Peer Networks - Wireless Perspectives (Hardcover, New)
Martin Fleury, Nadia Qadri
R4,843 Discovery Miles 48 430 Ships in 18 - 22 working days

The number of users who rely on the Internet to deliver multimedia content has grown significantly in recent years. As this consumer demand grows, so, too, does our dependency on a wireless and streaming infrastructure which delivers videos, podcasts, and other multimedia. Streaming Media with Peer-to-Peer Networks: Wireless Perspectives offers insights into current and future communication technologies for a converged Internet that promises soon to be dominated by multimedia applications, at least in terms of bandwidth consumption. The book will be of interest to industry managers, and will also serve as a valuable resource to students and researchers looking to grasp the dynamic issues surrounding video streaming and wireless network development.

Network Performance Analysis - Using the J Programming Language (Hardcover, 2008 ed.): Alan Holt Network Performance Analysis - Using the J Programming Language (Hardcover, 2008 ed.)
Alan Holt
R2,772 Discovery Miles 27 720 Ships in 18 - 22 working days

The purpose of network performance analysis is to investigate how traffic-management mechanisms deployed in the network affect the allocation of resources amongst its users and the performance they experience. This topic can be studied by the construction of models of traffic management mechanisms and observing how they perform by applying them to some flow of network traffic.

This useful volume introduces concepts and principles of network performance analysis by example, using the J programming language. J is rich in mathematical functionality, which makes it an ideal tool for analytical methods. The book favours a practical approach and develops functions in J to demonstrate mathematical concepts, thereby enabling readers to explore the underlying principles behind network performance analysis. In addition, this allows the subject to become more accessible to those who, although have a mathematical background, are not pure mathematicians.

Topics and features:

a [ Uses an example-driven approach to introduce the fundamentals of network performance analysis

a [ Provides a concise introduction to the J programming language

a [ Presents network calculus as a method for designing and engineering networks

a [ Focuses on statistical analysis and stochastic processes

a [ Demonstrates how to simulate traffic with both short-range and long-range dependence properties

a [ Covers ATM QoS, and examines Internet congestion control

Network Performance Analysis will equally appeal to network professionals and postgraduates studying the topic by providing valuable analytical tools and using J as a means of offering a practical treatment of the subject. Dr. Holthas a broad range of industry experience and now regularly lectures on this topic.

Testing of Communicating Systems - Proceedings of the IFIP TC6 11th International Workshop on Testing of Communicating Systems... Testing of Communicating Systems - Proceedings of the IFIP TC6 11th International Workshop on Testing of Communicating Systems (IWTCS'98) August 31-September 2, 1998, Tomsk, Russia (Hardcover, 1998 ed.)
Nina Yevtushenko
R4,212 Discovery Miles 42 120 Ships in 18 - 22 working days

Testing of Communicating Systems presents the latest world-wide results in both theory and practice. This volume provides a forum in which the substantial volume of research on the testing of communicating systems, spanning from conformance testing through interoperability testing, to performance and QoS testing, is brought together. The following topics are discussed in detail: Types of testing; Phases of the testing process; Classes of systems to be tested; and Theory and practice of testing. This book contains the selected proceedings of the 11th International Workshop on the Testing of Communicating Systems, formerly the International Workshop on Protocol Test Systems, sponsored by the International Federation for Information Processing (IFIP), and held in Tomsk, Russia, in August/September 1998. Testing of Communicating Systems will be essential reading for engineers, IT managers and research personnel working in computer sciences and telecommunications.

Performance of Information and Communication Systems - IFIP TC6 / WG6.3 Seventh International Conference on Performance of... Performance of Information and Communication Systems - IFIP TC6 / WG6.3 Seventh International Conference on Performance of Information and Communication Systems (PICS '98) 25-28 May 1998, Lund, Sweden (Hardcover, 1998 ed.)
Ulf Koerner, Arne Nilsson
R5,335 Discovery Miles 53 350 Ships in 18 - 22 working days

During the last two decades we have seen a tremendous development within the computer and communication industry. The ever increasing density on silicon, the increasing transmission speeds on fiber based systems as well as twisted pairs, the revolutionary development in the wireless area and of course the Internet have all led to many opportunities for new service developments. It is interesting to note that the last time this conference was held three years ago, the Web really did not fully exist. We are now ready to face new interesting challenges. It is an utmost importance for the performance community to focus on the modeling and analysis of the Internet, the multimedia applications and the untethered applications that are coming to the forefront. There will be a need for new and better simulation methods, new analytical tools and a much better understanding of measurement techniques. "Performance of Information and Communication Systems," PICS'98, which takes place in Lund, Sweden, May 25-28, 1998, is the seventh conference in a series on performance of communication systems organized by IFIP TC 6, WG 6.3. In response to our call for papers, we have received nearly fifty submissions.

Wireless Ad Hoc and Sensor Networks - A Cross-Layer Design Perspective (Hardcover, 2007 ed.): Raja Jurdak Wireless Ad Hoc and Sensor Networks - A Cross-Layer Design Perspective (Hardcover, 2007 ed.)
Raja Jurdak
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

The book is a reference book for research and graduate studies. The purpose of the book is to expose researchers and graduate students to state-of-the-art advances in cross-layer design for wireless ad hoc and sensor networks. In particular, the book will explore the optimization potential of cross-layer design approaches for wireless ad hoc and sensor network performance. The book will consist of two main parts: a theoretical section that provides an overview of design issues in both strictly layered and cross-layer approaches for ad hoc and sensor networks; and a practical section that builds on these issues to explore three case studies of diverse ad hoc and sensor network applications and communication technologies.

Cloud Computing Applications and Techniques for E-Commerce (Hardcover): Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy Cloud Computing Applications and Techniques for E-Commerce (Hardcover)
Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Many professional fields have been affected by the rapid growth of technology and information. Included in this are the business and management markets as the implementation of e-commerce and cloud computing have caused enterprises to make considerable changes to their practices. With the swift advancement of this technology, professionals need proper research that provides solutions to the various issues that come with data integration and shifting to a technology-driven environment. Cloud Computing Applications and Techniques for E-Commerce is an essential reference source that discusses the implementation of data and cloud technology within the fields of business and information management. Featuring research on topics such as content delivery networks, virtualization, and software resources, this book is ideally designed for managers, educators, administrators, researchers, computer scientists, business practitioners, economists, information analysists, sociologists, and students seeking coverage on the recent advancements of e-commerce using cloud computing techniques.

Phonetics - The Science of Speech (Paperback): Martin J. Ball, Joan Rahilly Phonetics - The Science of Speech (Paperback)
Martin J. Ball, Joan Rahilly
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

In their comprehensive new introduction to phonetics, Ball and Rahilly offer a detailed explanation of the process of speech production, from the anatomical initiation of sounds and their modification in the larynx, through to the final articulation of vowels and consonants in the oral and nasal tracts. This textbook is one of the few to give a balanced account of segmental and suprasegmental aspects of speech, showing clearly that the communication chain is incomplete without accurate production of both individual speech sounds (segmental features) and aspects such as stress and intonation (suprasegmental features). Throughout the book the authors provide advice on transcription, primarily using the International Phonetic Alphabet (IPA). Students are expertly guided from basic attempts to record speech sounds on paper, to more refined accounts of phonetic detail in speech. The authors go on to explain acoustic phonetics in a manner accessible both to new students in phonetics, and to those who wish to advance their knowledge of key pursuits in the area, including the sound spectrograph. They describe how speech waves can be measured, as well as considering how they are heard and decoded by listeners, discussing both physiological and neurological aspects of hearing and examining the methods of psychoacoustic experimentation. A range of instrumentation for studying speech production is also presented. The next link is acoustic phonetics, the study of speech transmission. Here the authors introduce the basic concepts of sound acoustics and the instrumentation used to analyse the characteristics of speech waves. Finally, the chain is completed by examining auditory phonetics, and providing a fascinating psychoacoustic experimentation, used to determine what parts of the speech signal are most crucial for listener understanding. The book concludes with a comprehensive survey and description of modern phonetic instrumentation, from the sound spectrograph to magnetic resonance imaging (MRI).

Management of Multimedia Networks and Services (Hardcover, 1998 ed.): Raouf Boutaba, Abdelhakim Hafid Management of Multimedia Networks and Services (Hardcover, 1998 ed.)
Raouf Boutaba, Abdelhakim Hafid
R4,164 Discovery Miles 41 640 Ships in 18 - 22 working days

With the continual growth in telecommunication services in today's multimedia environment, reliability and control are essential elements in the provision of services. This book addresses the need for an integration of service and management in multimedia networks in order to facilitate greater accuracy and quality in the services provided. The book aims to disseminate all facets of network and service management in broadband networks and multimedia services while providing an overview of state-of-the-art research and implementation experiences in the field.

Collaborative Computer Security and Trust Management (Hardcover): Collaborative Computer Security and Trust Management (Hardcover)
R4,567 Discovery Miles 45 670 Ships in 18 - 22 working days

As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats. Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covering topics such as trust-based security, threat and risk analysis, and data sharing, this reference book provides a complete collection of the latest field developments.

Crosstalk in WDM Communication Networks (Hardcover): Idelfonso Tafur Monroy, Eduward Tangdiongga Crosstalk in WDM Communication Networks (Hardcover)
Idelfonso Tafur Monroy, Eduward Tangdiongga
R2,770 Discovery Miles 27 700 Ships in 18 - 22 working days

Optical communications networks are an essential part of the world wide te- communication infrastructure . The number of users of present and future telecommunication services like Internet, web browsing and tele-education is expected to increase dramatically . As a consequence there is an imminent - mand for high broadband and high capacity communication systems. A prom- ing solution is found in the concept of all-optical networks . These networks exploit the vast capacity of the optical fiber by using multiplexing techniques that allow for an overall capacity of terabits per second. Channels are routed and switched in the optical domain . In this manner data channels are carried from the receiver side to its destination making use of optical transmission techniques . Wavelength division multiplexing (WDM) is a transmission technique that has dramatically increased the capacity of optical transmission systems. WDM allows for transmission of several channels over a single optical fiber by - ing different wavelength as the channel carrier . Optical switching and routing techniques are also being developed to cope with the high data speeds and n- ber of channel carried in the optical fibers. These functionalities are provided by optical crossconnects. The use of transmission techniques such as WDM in combination with optical crossconnects is enabling optical networking at high bit-rates reaching terabits per second . These techniques also offer ways to improve the network flexibility and configurability .

Testing of Communicating Systems - IFIP TC6 10th International Workshop on Testing of Communicating Systems, 8-10 September... Testing of Communicating Systems - IFIP TC6 10th International Workshop on Testing of Communicating Systems, 8-10 September 1997, Cheju Island, Korea (Hardcover, 1997 ed.)
Myungchul Kim, Sungwon Kang, Keesoo Hong
R5,393 Discovery Miles 53 930 Ships in 18 - 22 working days

The aim of this book is to bring together the research of academics and practitioners in the field of communication systems testing. It covers four major topic areas; types of testing including conformance testing, inoperability testing, performance and QoS testing; phases of testing including test case generation, means of testing, test execution and test results analysis; classes of systems tested and the theory and practice of testing including test-related algorithms, practical testing methodology and practical testing experience.

Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition): R. Anderson Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition)
R. Anderson
R1,689 R1,366 Discovery Miles 13 660 Save R323 (19%) Ships in 9 - 17 working days

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?

Open Distributed Processing and Distributed Platforms (Hardcover, 1997 ed.): Jerome Rolia, Jacob Slonim, John Botsford Open Distributed Processing and Distributed Platforms (Hardcover, 1997 ed.)
Jerome Rolia, Jacob Slonim, John Botsford
R4,192 Discovery Miles 41 920 Ships in 18 - 22 working days

Advances in computer networking have allowed computer systems across the world to be interconnected. Open Distributed Processing (ODP) systems are those that support heterogenous distributed applications both within and between autonomous organizations. Many challenges must be overcome before ODP systems can be fully realized. This book describes the recent advances in the theory and practice of developing, deploying and managing open distributed systems. Applications of these systems include but are not limited to telecommunication, medical and large scale transaction processing and electronic commerce systems. All of these are currently developed on distributed platforms. For anybody working in industry or research in this field, Open Distributed Processing and Distributed Platforms will prove an invaluable text.

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (Hardcover): Nabie Y. Conteh Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (Hardcover)
Nabie Y. Conteh
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention is a comprehensive text that discusses and defines ethical hacking, including the skills and concept of ethical hacking, and studies the countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer-related crimes. It broadens the understanding of cybersecurity by providing the necessary tools and skills to combat cybercrime. Some specific topics include top cyber investigation trends, data security of consumer devices, phases of hacking attacks, and stenography for secure image transmission. This book is relevant for ethical hackers, cybersecurity analysts, computer forensic experts, government officials, practitioners, researchers, academicians, and students interested in the latest techniques for preventing and combatting cybercrime.

Error-Control Coding for Data Networks (Hardcover, 1999 ed.): Irving S. Reed, Xuemin Chen Error-Control Coding for Data Networks (Hardcover, 1999 ed.)
Irving S. Reed, Xuemin Chen
R4,318 Discovery Miles 43 180 Ships in 18 - 22 working days

The subject of error-control coding bridges several disciplines, in particular mathematics, electrical engineering and computer science. The theory of error-control codes is often described abstractly in mathematical terms only, for the benefit of other coding specialists. Such a theoretical approach to coding makes it difficult for engineers to understand the underlying concepts of error correction, the design of digital error-control systems, and the quantitative behavior of such systems. In this book only a minimal amount of mathematics is introduced in order to describe the many, sometimes mathematical, aspects of error-control coding. The concepts of error correction and detection are in many cases sufficiently straightforward to avoid highly theoretical algebraic constructions. The reader will find that the primary emphasis of the book is on practical matters, not on theoretical problems. In fact, much of the material covered is summarized by examples of real developments, and almost all of the error-correction and detection codes introduced are attached to related practical applications. Error-Control Coding for Data Networks takes a structured approach to channel-coding, starting with the basic coding concepts and working gradually towards the most sophisticated coding systems. The most popular applications are described throughout the book. These applications include the channel-coding techniques used in mobile communication systems, such as: the global system for mobile communications (GSM) and the code-division multiple-access (CDMA) system, coding schemes for High-Definition TeleVision (HDTV) system, the Compact Disk (CD), and Digital Video Disk (DVD), as well as theerror-control protocols for the data-link layers of networks, and much more. The book is compiled carefully to bring engineers, coding specialists, and students up to date in the important modern coding technologies. Both electrical engineering students and communication engineers will benefit from the information in this largely self-contained text on error-control system engineering.

Security in Smart Home Networks (Hardcover, 1st ed. 2023): Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen Security in Smart Home Networks (Hardcover, 1st ed. 2023)
Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
R3,304 Discovery Miles 33 040 Ships in 18 - 22 working days

This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.

Big-Data Analytics and Cloud Computing - Theory, Algorithms and Applications (Hardcover, 1st ed. 2015): Marcello Trovati,... Big-Data Analytics and Cloud Computing - Theory, Algorithms and Applications (Hardcover, 1st ed. 2015)
Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu
R3,763 Discovery Miles 37 630 Ships in 18 - 22 working days

This book reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts in big data science. Topics and features: describes the innovative advances in theoretical aspects of big data, predictive analytics and cloud-based architectures; examines the applications and implementations that utilize big data in cloud architectures; surveys the state of the art in architectural approaches to the provision of cloud-based big data analytics functions; identifies potential research directions and technologies to facilitate the realization of emerging business models through big data approaches; provides relevant theoretical frameworks, empirical research findings, and numerous case studies; discusses real-world applications of algorithms and techniques to address the challenges of big datasets.

Web-Weaving - Intranets, Extranets and Strategic Alliances (Paperback): Paula Boyle, Peter Lloyd Web-Weaving - Intranets, Extranets and Strategic Alliances (Paperback)
Paula Boyle, Peter Lloyd
R1,354 R1,040 Discovery Miles 10 400 Save R314 (23%) Ships in 10 - 15 working days

Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and Organizational Development using contributions from innovative thinkers and practitioners in both areas. The first section defines what web-weaving actual is, describing the huge range of communication technology available to organizations at the moment. The second section reviews web-weaving in practice using case studies of companies using intranet and extranet technology. The third section brings together commentaries from leading players in both the IT and Human Resources fields to predict the future of web-weaving and the huge impact it will have on the way organizations and the people within them will work together in the future.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,311 Discovery Miles 33 110 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Health - Mobile and Wearable…
Shabbir Syed-Abdul, Xinxin Zhu, … Paperback R2,525 Discovery Miles 25 250
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140

 

Partners