0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,598)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover): Osman Khalid,... Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover)
Osman Khalid, Samee U. Khan, Albert Y. Zomaya
R3,323 R3,000 Discovery Miles 30 000 Save R323 (10%) Ships in 18 - 22 working days

First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data to suggest information, products, and services that best match their preferences. In recent decades, we have seen an exponential increase in the volumes of data, which has introduced many new challenges. Divided into two volumes, this comprehensive set covers recent advances, challenges, novel solutions, and applications in big data recommender systems. Volume 1 contains 14 chapters addressing foundations, algorithms and architectures, approaches for big data, and trust and security measures. Volume 2 covers a broad range of application paradigms for recommender systems over 22 chapters.

Mobile Computing and Wireless Communications (Hardcover): Timothy Kolaya Mobile Computing and Wireless Communications (Hardcover)
Timothy Kolaya
R3,076 R2,791 Discovery Miles 27 910 Save R285 (9%) Ships in 18 - 22 working days
Global Virtual Enterprises in Cloud Computing Environments (Hardcover): N. Raghavendra Rao Global Virtual Enterprises in Cloud Computing Environments (Hardcover)
N. Raghavendra Rao
R5,321 Discovery Miles 53 210 Ships in 18 - 22 working days

Modern businesses are on the lookout for ventures that boost their profits and marketability. Certain new and innovative technological advances can help enterprises accomplish their ambitious goals while providing detailed information to assess all aspects of the business. Global Virtual Enterprises in Cloud Computing Environments is a collection of innovative studies on business processes, procedures, methods, strategy, management thinking, and utilization of technology in cloud computing environments. While highlighting topics including international business strategy, virtual reality, and intellectual capital, this book is ideally designed for corporate executives, research scholars, and students pursuing courses in the areas of management and big data applications seeking current research on effective open innovation strategies in global business.

Impact of Digital Transformation on Security Policies and Standards (Hardcover): Sam Goundar, S. Bharath Bhushan, Vaishali... Impact of Digital Transformation on Security Policies and Standards (Hardcover)
Sam Goundar, S. Bharath Bhushan, Vaishali Ravindra Thakare
R5,936 Discovery Miles 59 360 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

How To Do Virtualization - Your Step By Step Guide To Virtualization (Hardcover): Howexpert How To Do Virtualization - Your Step By Step Guide To Virtualization (Hardcover)
Howexpert
R719 Discovery Miles 7 190 Ships in 18 - 22 working days
Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,514 Discovery Miles 45 140 Ships in 18 - 22 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Telecommunications Engineering: Networks and Architecture (Hardcover): Bernhard Ekman Telecommunications Engineering: Networks and Architecture (Hardcover)
Bernhard Ekman
R3,177 R2,879 Discovery Miles 28 790 Save R298 (9%) Ships in 18 - 22 working days
On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R680 Discovery Miles 6 800 Ships in 18 - 22 working days
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover): Gregory B White,... Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover)
Gregory B White, Natalie Sjelin
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.

AWS Lambda Developer Guide (Hardcover): Documentation Team AWS Lambda Developer Guide (Hardcover)
Documentation Team
R2,749 Discovery Miles 27 490 Ships in 18 - 22 working days
IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Vishal Jain, Omprakash... IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Vishal Jain, Omprakash Kaiwartya, Nanhay Singh
R5,905 Discovery Miles 59 050 Ships in 18 - 22 working days

The optimization of traffic management operations has become a considerable challenge in today's global scope due to the significant increase in the number of vehicles, traffic congestions, and automobile accidents. Fortunately, there has been substantial progress in the application of intelligent computing devices to transportation processes. Vehicular ad-hoc networks (VANETs) are a specific practice that merges the connectivity of wireless technologies with smart vehicles. Despite its relevance, empirical research is lacking on the developments being made in VANETs and how certain intelligent technologies are being applied within transportation systems. IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks provides emerging research exploring the theoretical and practical aspects of intelligent transportation systems and analyzing the modern techniques that are being applied to smart vehicles through cloud technology. Featuring coverage on a broad range of topics such as health monitoring, node localization, and fault tolerance, this book is ideally designed for network designers, developers, analysists, IT specialists, computing professionals, researchers, academics, and post-graduate students seeking current research on emerging computing concepts and developments in vehicular ad-hoc networks.

Multidisciplinary Approach to Modern Digital Steganography (Hardcover): Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith... Multidisciplinary Approach to Modern Digital Steganography (Hardcover)
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

6G Key Technologies - A Comprehensive Guide (Hardcover): Jiang 6G Key Technologies - A Comprehensive Guide (Hardcover)
Jiang
R3,192 Discovery Miles 31 920 Ships in 10 - 15 working days

6G Key Technologies An accessible and integrated roadmap to the technologies enabling 6G development In 6G Key Technologies: A Comprehensive Guide, two internationally well-recognized experts deliver a thoroughly original and comprehensive exploration of the technologies enabling and contributing to the development of 6G. The book presents the vision of 6G by reviewing the evolution of communications technologies toward 6G and examining the factors driving that development, as well as their requirements, use cases, key performance indicators, and more. Readers will discover: Thorough introductions to the standardization and technology evolution toward 6G, as well as the vision behind the development of 6G in terms of architectures, algorithms, protocols, and applications. In-depth explorations of full-spectrum wireless technologies in 6G, including enhanced millimeter wave technologies, terahertz-based communications and networking, visible-light and optical wireless communications. Fulsome discussions of smart radio networks and new air interface technologies for 6G including intelligent reflecting surface, cellular massive MIMO, cell-free massive MIMO, adaptive and non-orthogonal multiple access technologies. Perfect for professional engineers, researchers, manufacturers, network operators, and software developers, 6G Key Technologies: A Comprehensive Guide will also earn a place in the libraries of graduate students studying in wireless communications, artificial intelligence, signal processing, microwave technology, information theory, antenna and propagation, system-on-chip implementation, and computer networks.

Cross-Industry Applications of Cyber Security Frameworks (Hardcover): Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman,... Cross-Industry Applications of Cyber Security Frameworks (Hardcover)
Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.

AWS Certified Advanced Networking Specialty Workbook - Exam: ANS C00 (Paperback): Ip Specialist AWS Certified Advanced Networking Specialty Workbook - Exam: ANS C00 (Paperback)
Ip Specialist
R534 Discovery Miles 5 340 Ships in 10 - 15 working days
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover): Arif Sari Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover)
Arif Sari
R4,875 Discovery Miles 48 750 Ships in 18 - 22 working days

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.

Amazon Athena User Guide (Hardcover): Documentation Team Amazon Athena User Guide (Hardcover)
Documentation Team
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days
Complex Systems and Clouds - A Self-Organization and Self-Management Perspective (Paperback): Dan C. Marinescu Complex Systems and Clouds - A Self-Organization and Self-Management Perspective (Paperback)
Dan C. Marinescu
R797 Discovery Miles 7 970 Ships in 10 - 15 working days

Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Large scale distributed computer systems have evolved into very complex systems and are at the point where they need to borrow self-adapting organizing concepts from nature. The book explores complexity in big distributed systems and in the natural processes in physics and chemistry, building a platform for understanding how self-organization in big distributed systems can be achieved. It goes beyond the theoretical description of self-organization to present principles for designing self-organizing systems, and concludes by showing the need for a paradigm shift in the development of large-scale systems from strictly deterministic to non-deterministic and adaptive.

Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R13,766 Discovery Miles 137 660 Ships in 18 - 22 working days
Hackable - How to Do Application Security Right (Hardcover): Ted Harrington Hackable - How to Do Application Security Right (Hardcover)
Ted Harrington
R668 R607 Discovery Miles 6 070 Save R61 (9%) Ships in 18 - 22 working days
Autonomic Network Management Principles - From Concepts to Applications (Paperback): Nazim Agoulmine Autonomic Network Management Principles - From Concepts to Applications (Paperback)
Nazim Agoulmine
R1,840 Discovery Miles 18 400 Ships in 10 - 15 working days

Autonomic networking aims to solve the mounting problems created by increasingly complex networks, by enabling devices and service-providers to decide, preferably without human intervention, what to do at any given moment, and ultimately to create self-managing networks that can interface with each other, adapting their behavior to provide the best service to the end-user in all situations. This book gives both an understanding and an assessment of the principles, methods and architectures in autonomous network management, as well as lessons learned from, the ongoing initiatives in the field. It includes contributions from industry groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and leading universities. These groups all provide chapters examining the international research projects to which they are contributing, such as the EU Autonomic Network Architecture Project and Ambient Networks EU Project, reviewing current developments and demonstrating how autonomic management principles are used to define new architectures, models, protocols, and mechanisms for future network equipment.

AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide (Hardcover): Documentation Team AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide (Hardcover)
Documentation Team
R1,173 Discovery Miles 11 730 Ships in 18 - 22 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover)
Information R Management Association
R11,904 Discovery Miles 119 040 Ships in 18 - 22 working days
Network Function Virtualization (Paperback): Ken Gray, Thomas D Nadeau Network Function Virtualization (Paperback)
Ken Gray, Thomas D Nadeau
R1,402 R1,274 Discovery Miles 12 740 Save R128 (9%) Ships in 10 - 15 working days

Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an enterprise, and learn how to evaluate all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight.

AWS Database Migration Service Step-by-Step Migration Guide (Hardcover): Documentation Team AWS Database Migration Service Step-by-Step Migration Guide (Hardcover)
Documentation Team
R1,144 Discovery Miles 11 440 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Developing Business Applications for the…
Christian Hur, Laura Ubelhor Paperback R1,819 R1,577 Discovery Miles 15 770
Knot Tying Book for Everyday Occasion…
Garrick Boyd Hardcover R628 R567 Discovery Miles 5 670
An Introduction to XML Query Processing…
Jiaheng Lu Hardcover R3,747 R3,446 Discovery Miles 34 460
Modern Macrame Book for Beginners and…
Alice Green Hardcover R659 R593 Discovery Miles 5 930
The Ultimate Book of Everyday Knots…
Geoffrey Budworth Paperback R432 Discovery Miles 4 320
Modeling Semantic Web Services - The Web…
Jos De Bruijn, Mick Kerrigan, … Hardcover R1,413 Discovery Miles 14 130
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier Hardcover R1,831 Discovery Miles 18 310
40 Knots and How to Tie Them
Lucy Davidson Hardcover  (1)
R324 Discovery Miles 3 240
Statement Macrame For Beginners - Many…
Errin Esquerre Paperback R251 Discovery Miles 2 510
Knots - The Best Complete Guide to Make…
Aaron Stewart Hardcover R671 R600 Discovery Miles 6 000

 

Partners