0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,630)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Modern Cryptography - Current Challenges and Solutions (Hardcover): Menachem Domb Modern Cryptography - Current Challenges and Solutions (Hardcover)
Menachem Domb
R3,059 Discovery Miles 30 590 Ships in 18 - 22 working days
Security in Vehicular Networks - Focus on Location  and Identity Privacy (Hardcover): L Benarous Security in Vehicular Networks - Focus on Location and Identity Privacy (Hardcover)
L Benarous
R3,490 Discovery Miles 34 900 Ships in 18 - 22 working days

Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover)
Information R Management Association
R11,906 Discovery Miles 119 060 Ships in 18 - 22 working days
Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover): Osman Khalid,... Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover)
Osman Khalid, Samee U. Khan, Albert Y. Zomaya
R3,323 R3,000 Discovery Miles 30 000 Save R323 (10%) Ships in 18 - 22 working days

First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data to suggest information, products, and services that best match their preferences. In recent decades, we have seen an exponential increase in the volumes of data, which has introduced many new challenges. Divided into two volumes, this comprehensive set covers recent advances, challenges, novel solutions, and applications in big data recommender systems. Volume 1 contains 14 chapters addressing foundations, algorithms and architectures, approaches for big data, and trust and security measures. Volume 2 covers a broad range of application paradigms for recommender systems over 22 chapters.

Mobile Computing and Wireless Communications (Hardcover): Timothy Kolaya Mobile Computing and Wireless Communications (Hardcover)
Timothy Kolaya
R3,076 R2,791 Discovery Miles 27 910 Save R285 (9%) Ships in 18 - 22 working days
Global Virtual Enterprises in Cloud Computing Environments (Hardcover): N. Raghavendra Rao Global Virtual Enterprises in Cloud Computing Environments (Hardcover)
N. Raghavendra Rao
R5,321 Discovery Miles 53 210 Ships in 18 - 22 working days

Modern businesses are on the lookout for ventures that boost their profits and marketability. Certain new and innovative technological advances can help enterprises accomplish their ambitious goals while providing detailed information to assess all aspects of the business. Global Virtual Enterprises in Cloud Computing Environments is a collection of innovative studies on business processes, procedures, methods, strategy, management thinking, and utilization of technology in cloud computing environments. While highlighting topics including international business strategy, virtual reality, and intellectual capital, this book is ideally designed for corporate executives, research scholars, and students pursuing courses in the areas of management and big data applications seeking current research on effective open innovation strategies in global business.

Amazon GuardDuty User Guide (Hardcover): Documentation Team Amazon GuardDuty User Guide (Hardcover)
Documentation Team
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days
Computer Programming The Doctrine 2.0 - Full Breakdown of HTML, Python, C, C++, Coding Raspberry PI, Java, SQL, HTML and Black... Computer Programming The Doctrine 2.0 - Full Breakdown of HTML, Python, C, C++, Coding Raspberry PI, Java, SQL, HTML and Black Hat Hacking. (Hardcover)
Adesh Silva
R698 R621 Discovery Miles 6 210 Save R77 (11%) Ships in 18 - 22 working days
Impact of Digital Transformation on Security Policies and Standards (Hardcover): Sam Goundar, S. Bharath Bhushan, Vaishali... Impact of Digital Transformation on Security Policies and Standards (Hardcover)
Sam Goundar, S. Bharath Bhushan, Vaishali Ravindra Thakare
R5,936 Discovery Miles 59 360 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

How To Do Virtualization - Your Step By Step Guide To Virtualization (Hardcover): Howexpert How To Do Virtualization - Your Step By Step Guide To Virtualization (Hardcover)
Howexpert
R719 Discovery Miles 7 190 Ships in 18 - 22 working days
Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,514 Discovery Miles 45 140 Ships in 18 - 22 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

AWS CodeBuild User Guide (Hardcover): Documentation Team AWS CodeBuild User Guide (Hardcover)
Documentation Team
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days
On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R680 Discovery Miles 6 800 Ships in 18 - 22 working days
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover): Gregory B White,... Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover)
Gregory B White, Natalie Sjelin
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.

AWS Lambda Developer Guide (Hardcover): Documentation Team AWS Lambda Developer Guide (Hardcover)
Documentation Team
R2,749 Discovery Miles 27 490 Ships in 18 - 22 working days
Amazon Kinesis Video Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Video Streams Developer Guide (Hardcover)
Documentation Team
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days
IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Vishal Jain, Omprakash... IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Vishal Jain, Omprakash Kaiwartya, Nanhay Singh
R5,905 Discovery Miles 59 050 Ships in 18 - 22 working days

The optimization of traffic management operations has become a considerable challenge in today's global scope due to the significant increase in the number of vehicles, traffic congestions, and automobile accidents. Fortunately, there has been substantial progress in the application of intelligent computing devices to transportation processes. Vehicular ad-hoc networks (VANETs) are a specific practice that merges the connectivity of wireless technologies with smart vehicles. Despite its relevance, empirical research is lacking on the developments being made in VANETs and how certain intelligent technologies are being applied within transportation systems. IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks provides emerging research exploring the theoretical and practical aspects of intelligent transportation systems and analyzing the modern techniques that are being applied to smart vehicles through cloud technology. Featuring coverage on a broad range of topics such as health monitoring, node localization, and fault tolerance, this book is ideally designed for network designers, developers, analysists, IT specialists, computing professionals, researchers, academics, and post-graduate students seeking current research on emerging computing concepts and developments in vehicular ad-hoc networks.

Multidisciplinary Approach to Modern Digital Steganography (Hardcover): Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith... Multidisciplinary Approach to Modern Digital Steganography (Hardcover)
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

6G Key Technologies - A Comprehensive Guide (Hardcover): Jiang 6G Key Technologies - A Comprehensive Guide (Hardcover)
Jiang
R3,192 Discovery Miles 31 920 Ships in 10 - 15 working days

6G Key Technologies An accessible and integrated roadmap to the technologies enabling 6G development In 6G Key Technologies: A Comprehensive Guide, two internationally well-recognized experts deliver a thoroughly original and comprehensive exploration of the technologies enabling and contributing to the development of 6G. The book presents the vision of 6G by reviewing the evolution of communications technologies toward 6G and examining the factors driving that development, as well as their requirements, use cases, key performance indicators, and more. Readers will discover: Thorough introductions to the standardization and technology evolution toward 6G, as well as the vision behind the development of 6G in terms of architectures, algorithms, protocols, and applications. In-depth explorations of full-spectrum wireless technologies in 6G, including enhanced millimeter wave technologies, terahertz-based communications and networking, visible-light and optical wireless communications. Fulsome discussions of smart radio networks and new air interface technologies for 6G including intelligent reflecting surface, cellular massive MIMO, cell-free massive MIMO, adaptive and non-orthogonal multiple access technologies. Perfect for professional engineers, researchers, manufacturers, network operators, and software developers, 6G Key Technologies: A Comprehensive Guide will also earn a place in the libraries of graduate students studying in wireless communications, artificial intelligence, signal processing, microwave technology, information theory, antenna and propagation, system-on-chip implementation, and computer networks.

Cross-Industry Applications of Cyber Security Frameworks (Hardcover): Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman,... Cross-Industry Applications of Cyber Security Frameworks (Hardcover)
Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.

Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover): Arif Sari Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover)
Arif Sari
R4,875 Discovery Miles 48 750 Ships in 18 - 22 working days

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.

Amazon CloudWatch Logs User Guide (Hardcover): Documentation Team Amazon CloudWatch Logs User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Complex Systems and Clouds - A Self-Organization and Self-Management Perspective (Paperback): Dan C. Marinescu Complex Systems and Clouds - A Self-Organization and Self-Management Perspective (Paperback)
Dan C. Marinescu
R797 Discovery Miles 7 970 Ships in 10 - 15 working days

Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Large scale distributed computer systems have evolved into very complex systems and are at the point where they need to borrow self-adapting organizing concepts from nature. The book explores complexity in big distributed systems and in the natural processes in physics and chemistry, building a platform for understanding how self-organization in big distributed systems can be achieved. It goes beyond the theoretical description of self-organization to present principles for designing self-organizing systems, and concludes by showing the need for a paradigm shift in the development of large-scale systems from strictly deterministic to non-deterministic and adaptive.

AWS Database Migration Service Step-by-Step Migration Guide (Hardcover): Documentation Team AWS Database Migration Service Step-by-Step Migration Guide (Hardcover)
Documentation Team
R1,144 Discovery Miles 11 440 Ships in 18 - 22 working days
Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R13,766 Discovery Miles 137 660 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Feature Selection for High-Dimensional…
Veronica Bolon-Canedo, Noelia Sanchez-Marono, … Hardcover R2,975 R1,804 Discovery Miles 18 040
Sparse Grids and Applications…
Jochen Garcke, Dirk Pfluger Hardcover R4,258 R3,458 Discovery Miles 34 580
Handbook of Research on Fireworks…
Ying Tan Hardcover R8,027 Discovery Miles 80 270
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,522 Discovery Miles 35 220
Development of Navigation Technology for…
Baburov S.V., Bestugin A.R., … Hardcover R3,124 Discovery Miles 31 240
Handbook of Research on Modeling…
Sujata Dash, B. K. Tripathy, … Hardcover R6,518 Discovery Miles 65 180
Glowworm Swarm Optimization - Theory…
Krishnanand N. Kaipa, Debasish Ghose Hardcover R3,906 R3,376 Discovery Miles 33 760
Advanced HDL Synthesis and SOC…
Vaibbhav Taraate Hardcover R4,644 Discovery Miles 46 440
Optimization and Its Applications in…
Boris Goldengorin Hardcover R4,178 R3,647 Discovery Miles 36 470
Coding for Kids in Python - Python…
Bob Mather Hardcover R851 Discovery Miles 8 510

 

Partners