0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (323)
  • R250 - R500 (924)
  • R500+ (16,412)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Paperback): Yves Caseau The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Paperback)
Yves Caseau
R1,094 Discovery Miles 10 940 Ships in 9 - 15 working days

The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation.

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover): Omar Santos Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover)
Omar Santos
R1,401 Discovery Miles 14 010 Ships in 10 - 15 working days

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organised test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco CyberOps Associate CBROPS 200-201 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test software Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Leading Cisco technology expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A video mentoring lesson from the authors Complete Video Course A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organise and optimise your study time

Practical Security for Agile and DevOps (Paperback): Mark S. Merkow Practical Security for Agile and DevOps (Paperback)
Mark S. Merkow
R1,854 Discovery Miles 18 540 Ships in 9 - 15 working days

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations

Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback): Peter Augustine, Pethuru Raj, Sathyan... Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback)
Peter Augustine, Pethuru Raj, Sathyan Munirathinam
R1,445 Discovery Miles 14 450 Ships in 9 - 15 working days

Digital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution. There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises. Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.

Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Paperback): Mark Sachleben Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Paperback)
Mark Sachleben
R1,386 Discovery Miles 13 860 Ships in 12 - 17 working days

The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. This book provides significant evidence that there are multiple motivations that lead states to participate in human rights treaties.

Solutions for Sharepoint Server 2003 - Site Definitions, Custom Templates, and Global Customizations (Paperback): Jason... Solutions for Sharepoint Server 2003 - Site Definitions, Custom Templates, and Global Customizations (Paperback)
Jason Nadrowski, Stacy Draper
R1,289 Discovery Miles 12 890 Ships in 12 - 17 working days

In "SharePoint 2003 Advanced Concepts," two world-class SharePoint consultants show how to make SharePoint " jump through hoops" for you-and do exactly what you want. Jason Nadrowski and Stacy Draper have built some of the most diverse SharePoint enterprise implementations. Now, drawing on their extraordinary " in the trenches" experience, they present solutions, techniques, and examples you simply won' t find anywhere else. "SharePoint 2003 Advanced Concepts" addresses every facet of SharePoint customization, from site definitions and templates to document libraries and custom properties. The authors cover both Windows SharePoint Services and SharePoint Portal Server 2003 and illuminate SharePoint' s interactions with other technologies-helping you troubleshoot problems far more effectively. Next time you encounter a tough SharePoint development challenge, don' t waste time: get your proven solution right here, in "SharePoint 2003 Advanced Concepts," - Construct more powerful site and list templates - Control how SharePoint uses ghosted and unghosted pages - Use custom site definitions to gain finer control over your site - Build list definitions with custom metadata, views, and forms - Troubleshoot WEBTEMP, ONET.XML, SCHEMA.XML, SharePoint databases, and their interactions - Create custom property types to extend SharePoint' s functionality - Integrate with other systems and SharePoint sites so that you can use their information more effectively - Customize themes and interactive Help, one step at a time - Customize email alerts and system notifications - Extend the capabilities of document libraries - Control document display and behavior based on extensions

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover): Jinhui Zhang, Yuanqing Xia, Zhongqi... Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover)
Jinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen
R2,303 Discovery Miles 23 030 Ships in 9 - 15 working days

The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.

5G New Radio Non-Orthogonal Multiple Access (Hardcover): Yifei Yuan, Zhifeng Yuan 5G New Radio Non-Orthogonal Multiple Access (Hardcover)
Yifei Yuan, Zhifeng Yuan
R3,056 Discovery Miles 30 560 Ships in 9 - 15 working days

In this book, fundamental theories and engineering designs of NOMA are organically blended, with comprehensive performance evaluations from both link level and system level simulations.

TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Hardcover): Rashid Abdelhaleem Saeed, Stephen... TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Hardcover)
Rashid Abdelhaleem Saeed, Stephen J. Shellhammer
R5,831 Discovery Miles 58 310 Ships in 12 - 17 working days

Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.

CBAP (R) Certification and BABOK (R) Study Guide (Paperback): Hans Jonasson CBAP (R) Certification and BABOK (R) Study Guide (Paperback)
Hans Jonasson
R1,378 Discovery Miles 13 780 Ships in 9 - 15 working days

The book covers all knowledge areas from the BABOK (R), Third Edition, and is designed to be a study guide for the CBAP (R) certification from IIBA (TM). It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA (R) certification. This book is a complete business analysis handbook combining the latest standards from the BABOK (R) case study examples and exercises with solutions. It has usable tools and techniques, as well as templates ready to be used to develop solid requirements to be the cornerstone for any successful product development.

IT Development in Korea - A Broadband Nirvana? (Hardcover): Kwang-Suk Lee IT Development in Korea - A Broadband Nirvana? (Hardcover)
Kwang-Suk Lee
R4,290 Discovery Miles 42 900 Ships in 12 - 17 working days

This book investigates the contextual factors that led to Korean society becoming 'broadband heaven' - the most wired nation in the world - by scrutinizing the historical contexts surrounding the Korean Information Infrastructure (KII) project (1995-2005), which aimed to establish a nationwide high-speed backbone network, as well as its later evolution, which involved redesigning the public infrastructure. The book details the hidden mechanisms and the real elements of building the 'broadband heaven': the global constraints conditioning its telecom policies, the dense state-capital linkages, and the bureaucratic desire for social control. It draws on the state-in-society approach to analyze the deformations caused by the symbiosis between the state and big business in implementing the rosy vision of the broadband network. This book provides insights into how to formulate future telecom policies along much more democratically participatory lines while restraining the overwhelming power of the telecom oligopolies and conglomerates. It stands alone as a comprehensive study of the recent East Asian model of IT development, written specifically to examine Korea's socio-historical mechanisms for promoting physical speed and broadband mobility. This book will be important reading to anyone interested in Korean Studies, Information Technology and I.T. Development.

Antipatterns - Managing Software Organizations and People, Second Edition (Hardcover, 2nd edition): Colin J. Neill, Philip A.... Antipatterns - Managing Software Organizations and People, Second Edition (Hardcover, 2nd edition)
Colin J. Neill, Philip A. Laplante, Joanna F Defranco
R2,364 Discovery Miles 23 640 Ships in 12 - 17 working days

Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly found in IT, software development, and other business domains. For each antipattern, it describes the situation and symptoms, gives examples, and offers a refactoring solution.

The authors, graduate faculty at Penn State University, avoid an overly scholarly style and infuse the text with entertaining sidebars, cartoons, stories, and jokes. They provide names for the antipatterns that are visual, humorous, and memorable. Using real-world anecdotes, they illustrate key concepts in an engaging manner. This updated edition sheds light on new management and environmental antipattems and includes a new chapter, six updated chapters, and new discussion questions. Topics covered include leadership principles, environmental antipatterns, group patterns, management antipatterns, and team leadership.

Following introductory material on management theory and human behavior, the text catalogs the full range of management, cultural, and environmental antipatterns. It includes thought-provoking exercises that each describe a situation, ask which antipatterns are present, and explain how to refactor the situation. It provides time-tested advice to help you overcome bad practices through successful interaction with your clients, customers, peers, supervisors, and subordinates.

Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback): Ariel Evans Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback)
Ariel Evans
R1,240 Discovery Miles 12 400 Ships in 9 - 15 working days

Addresses one of the hottest issues facing all businesses today, and one that can destroy companies overnight - cybersecurity. Identifies how to implement cybersecurity strategy and practices in a straightforward way. Demystifies a crucial topic for executives, taking it away from an information technology issue and making it understandable for business leaders and board members with governance oversight. Ideal reading for executives, and also students on the growing number of courses on this topic.

Optimization for Communications and Networks (Hardcover): Poompat Saengudomlert Optimization for Communications and Networks (Hardcover)
Poompat Saengudomlert
R3,096 Discovery Miles 30 960 Ships in 12 - 17 working days

"The book provides an introduction to optimization theory and its applications. It is written for senior under-graduate students and first-year graduate students of telecommunication and related fields. Most applications pertain to communication and network problems. Optimization theory involves a great deal of mathematics. The book has practical examples to accompany rigorous discussion so that the reader may develop intuitive understanding on relevant concepts. The materials have been developed from course notes. By attempting to cover convex, linear, and integer optimization for a one-semester course, the author focuses on fundamental concepts and techniques rather than trying to be comprehensive. Infact, the book is written with the main intention to serve as a bridge for students with no prior background in optimization to be able to access more advanced books on the subject later on. "--

Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition): Jessica... Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition)
Jessica Barker
R1,459 R1,163 Discovery Miles 11 630 Save R296 (20%) Ships in 12 - 17 working days

The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.

IoT and AI Technologies for Sustainable Living - A Practical Handbook (Hardcover): Abid Hussain, Garima Tyagi, Sheng-Lung Peng IoT and AI Technologies for Sustainable Living - A Practical Handbook (Hardcover)
Abid Hussain, Garima Tyagi, Sheng-Lung Peng
R3,056 Discovery Miles 30 560 Ships in 9 - 15 working days

Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market

Advanced Wireless Communication and Sensor Networks - Applications and Simulations (Hardcover): Ashish Bagwari, Geetam Singh... Advanced Wireless Communication and Sensor Networks - Applications and Simulations (Hardcover)
Ashish Bagwari, Geetam Singh Tomar, Jyotshana Bagwari, Jorge Luis Victória Barbosa, Musti K.S. Sastry
R3,405 Discovery Miles 34 050 Ships in 12 - 17 working days

This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Features: Covers technologies supporting advanced wireless communication system, sensor networks and the conceptual development of the subject. Discusses advanced data gathering and sharing/ distributed sensing techniques with its business applicability. Includes numerous worked-out mathematical equations/formulas, and essential principles including figures, illustrations, algorithms, and flow charts are included in the book. Provides pervasive background knowledge including both wireless communications and wireless sensor networks Covers wireless networks as well as sensor network models in detailed. This is aimed at graduate students, researchers and academicians working in the field of computer science, wireless communication technology, and advanced wireless sensor networks.

Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover): Mark S. Merkow, Lakshmikanth Raghavan Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover)
Mark S. Merkow, Lakshmikanth Raghavan
R2,357 Discovery Miles 23 570 Ships in 12 - 17 working days

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:

  • Pre-developed nonfunctional requirements that can be reused for any software development project
  • Documented test cases that go along with the requirements and can be used to develop a Test Plan for the software
  • Testing methods that can be applied to the test cases provided
  • A CD with all security requirements and test cases as well as MS Word versions of the checklists, requirements, and test cases covered in the book

Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle.

Some Praise for the Book:

This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation ... .
Doug Cavit, Chief Security Strategist, Microsoft Corporation

...provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC).
Jeff Weekes, Sr. Security Architect at Terra Verde Services
... full of useful insights and practical advice from two authors who have lived this process. What you get is a tactical application security roadmap that cuts through the noise and is immediately applicable to your projects.
Jeff Williams, Aspect Security CEO and Volunteer Chair of the OWASP Foundation

Building Enterprise Systems with ODP - An Introduction to Open Distributed Processing (Hardcover): Peter F Linington, Zoran... Building Enterprise Systems with ODP - An Introduction to Open Distributed Processing (Hardcover)
Peter F Linington, Zoran Milosevic, Akira Tanaka, Antonio Vallecillo
R2,358 Discovery Miles 23 580 Ships in 12 - 17 working days

The Reference Model of Open Distributed Processing (RM-ODP) is an international standard that provides a solid basis for describing and building widely distributed systems and applications in a systematic way. It stresses the need to build these systems with evolution in mind by identifying the concerns of major stakeholders and then expressing the design as a series of linked viewpoints. Although RM-ODP has been a standard for more than ten years, many practitioners are still unaware of it. Building Enterprise Systems with ODP: An Introduction to Open Distributed Processing offers a gentle pathway to the essential ideas that constitute ODP and shows how these ideas can be applied when designing and building challenging systems. It provides an accessible introduction to the design principles for software engineers and enterprise architects. The book also explains the benefits of using viewpoints to produce simpler and more flexible designs and how ODP can be applied to service engineering, open enterprise, and cloud computing. The authors include guidelines for using the Unified Modeling Language (TM) (UML) notation and for structuring and writing system specifications. They elucidate how this fits into the model-driven engineering tool chain via approaches, such as Model-Driven Architecture (R) (MDA). They also demonstrate the power of RM-ODP for the design and organization of complex distributed IT systems in e-government, e-health, and energy and transportation industries. All concepts and ideas in the book are illustrated through a single running example that describes the IT support needed by a medium-sized company as it grows and develops. Complete UML models and more are available at http://theodpbook.lcc.uma.es/

Networking in Japanese Factory Automation (Hardcover): Koichi Kishimoto Networking in Japanese Factory Automation (Hardcover)
Koichi Kishimoto
R3,978 Discovery Miles 39 780 Ships in 12 - 17 working days

In Japan information technology has been a vital part of manufacturing for decades. A central factory computer provides a production plan and shop minicomputers and microcomputers in the factory run machines that manufacture products. It has become necessary to connect computers installed at different locations to enable information exchange between different sections. This requires an intracompany network with large memory capacity and high-speed communication capability to process documents, drawings, and image data, as well as conventional code data: a local area network (LAN). This volume discusses the ring-type LAN; the TOSLINE-8000 high-speed optical data highway for high-speed real-time control systems; the TOSLINE-2000E, a compact, low-cost independent local area network; the status of MAP, a communications protocol for manufacturing automation established by General Motors and MAP activities in Japan

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,734 Discovery Miles 17 340 Ships in 9 - 15 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Network Evolution and Applications (Hardcover): Ciro Rodriguez, Vikas Kumar Jha, Bishwajeet Kumar Pandey Network Evolution and Applications (Hardcover)
Ciro Rodriguez, Vikas Kumar Jha, Bishwajeet Kumar Pandey
R1,928 Discovery Miles 19 280 Ships in 9 - 15 working days

Discusses the requirements and establishment of a layered protocol architecture. Highlights the importance of cable media in getting a high-speed network. Covers the fundamental concepts and advanced topics such as metro ethernet, and ethernet first mile in the field of networking. Presents important topics such as multiprotocol label switching, cloud computing in networking, and the internet of things. Explores the necessity of software-defined networking and network functions virtualization.

Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover): Luke Munn Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover)
Luke Munn
R1,436 Discovery Miles 14 360 Ships in 9 - 15 working days

How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical "solutions" back into open questions about what society wants and what infrastructures should do. Moving from data centers in Hong Kong to undersea cables in Singapore and server clusters in China, Munn combines rich empirical material with insights drawn from media and cultural studies, sociology, and philosophy. This critical analysis stresses that infrastructures are not just technical but deeply epistemological, privileging some actions and actors while sidelining others. This innovative exploration of the values and visions at the heart of our technologies will interest students, scholars, and researchers in the areas of communication studies, digital media, technology studies, sociology, philosophy of technology, information studies, and geography.

Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover): Rebecca Herold, Marcus K. Rogers Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover)
Rebecca Herold, Marcus K. Rogers
R36,369 Discovery Miles 363 690 Ships in 12 - 17 working days

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia's four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available OnlineThis Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]

Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition): R. Anderson, J. D Dewar Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition)
R. Anderson, J. D Dewar; Edited by Harold F. Tipton
R2,187 Discovery Miles 21 870 Ships in 12 - 17 working days

The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)(2) CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)(2) certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,331 R1,194 Discovery Miles 11 940
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,222 R946 Discovery Miles 9 460
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,194 R848 Discovery Miles 8 480
Building Microservices
Sam Newman Paperback R1,241 Discovery Miles 12 410
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,124 R907 Discovery Miles 9 070
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R635 Discovery Miles 6 350

 

Partners