0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Advanced Technologies of Quantum Key Distribution (Hardcover): Sergiy Gnatyuk Advanced Technologies of Quantum Key Distribution (Hardcover)
Sergiy Gnatyuk
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days
Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover): Brij B. Gupta Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover)
Brij B. Gupta
R5,773 Discovery Miles 57 730 Ships in 10 - 15 working days

In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Security in Vehicular Networks - Focus on Location  and Identity Privacy (Hardcover): L Benarous Security in Vehicular Networks - Focus on Location and Identity Privacy (Hardcover)
L Benarous
R3,782 Discovery Miles 37 820 Ships in 10 - 15 working days

Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover)
Information R Management Association
R12,918 Discovery Miles 129 180 Ships in 10 - 15 working days
Smart Cities Cybersecurity and Privacy (Paperback): Danda B. Rawat, Kayhan Zrar Ghafoor Smart Cities Cybersecurity and Privacy (Paperback)
Danda B. Rawat, Kayhan Zrar Ghafoor
R2,711 Discovery Miles 27 110 Ships in 12 - 19 working days

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,216 Discovery Miles 102 160 Ships in 10 - 15 working days
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,742 Discovery Miles 77 420 Ships in 10 - 15 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

AWS Storage Gateway User Guide (Hardcover): Documentation Team AWS Storage Gateway User Guide (Hardcover)
Documentation Team
R1,609 Discovery Miles 16 090 Ships in 10 - 15 working days
Amazon WorkSpaces Administration Guide (Hardcover): Documentation Team Amazon WorkSpaces Administration Guide (Hardcover)
Documentation Team
R958 Discovery Miles 9 580 Ships in 10 - 15 working days
Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,216 Discovery Miles 102 160 Ships in 10 - 15 working days
Cross-Industry Applications of Cyber Security Frameworks (Hardcover): Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman,... Cross-Industry Applications of Cyber Security Frameworks (Hardcover)
Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R12,904 Discovery Miles 129 040 Ships in 10 - 15 working days
8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R616 R567 Discovery Miles 5 670 Save R49 (8%) Ships in 12 - 19 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

AWS Data Pipeline Developer Guide (Hardcover): Documentation Team AWS Data Pipeline Developer Guide (Hardcover)
Documentation Team
R2,398 Discovery Miles 23 980 Ships in 10 - 15 working days
Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (Paperback): Arun Kumar Sangaiah,... Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (Paperback)
Arun Kumar Sangaiah, Zhiyong Z,Zhang, Michael Sheng
R3,366 R3,148 Discovery Miles 31 480 Save R218 (6%) Ships in 12 - 19 working days

Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications covers timely topics, including the neural network (NN), particle swarm optimization (PSO), evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS), etc. Furthermore, the book highlights recent research on representative techniques to elaborate how a data-centric system formed a powerful platform for the processing of cloud hosted multimedia big data and how it could be analyzed, processed and characterized by CI. The book also provides a view on how techniques in CI can offer solutions in modeling, relationship pattern recognition, clustering and other problems in bioengineering. It is written for domain experts and developers who want to understand and explore the application of computational intelligence aspects (opportunities and challenges) for design and development of a data-centric system in the context of multimedia cloud, big data era and its related applications, such as smarter healthcare, homeland security, traffic control trading analysis and telecom, etc. Researchers and PhD students exploring the significance of data centric systems in the next paradigm of computing will find this book extremely useful.

AWS Key Management Service Developer Guide (Hardcover): Documentation Team AWS Key Management Service Developer Guide (Hardcover)
Documentation Team
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days
Handbook of Research on Advanced Applications of Graph Theory in Modern Society (Hardcover): Madhumangal Pal, Sovan Samanta,... Handbook of Research on Advanced Applications of Graph Theory in Modern Society (Hardcover)
Madhumangal Pal, Sovan Samanta, Anita Pal
R7,278 Discovery Miles 72 780 Ships in 10 - 15 working days

In the world of mathematics and computer science, technological advancements are constantly being researched and applied to ongoing issues. Setbacks in social networking, engineering, and automation are themes that affect everyday life, and researchers have been looking for new techniques in which to solve these challenges. Graph theory is a widely studied topic that is now being applied to real-life problems. Advanced Applications of Graph Theory in Modern Society is an essential reference source that discusses recent developments on graph theory, as well as its representation in social networks, artificial neural networks, and many complex networks. The book aims to study results that are useful in the fields of robotics and machine learning and will examine different engineering issues that are closely related to fuzzy graph theory. Featuring research on topics such as artificial neural systems and robotics, this book is ideally designed for mathematicians, research scholars, practitioners, professionals, engineers, and students seeking an innovative overview of graphic theory.

Multidisciplinary Approach to Modern Digital Steganography (Hardcover): Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith... Multidisciplinary Approach to Modern Digital Steganography (Hardcover)
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
R5,784 Discovery Miles 57 840 Ships in 10 - 15 working days

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

Amazon EMR Release Guide (Hardcover): Documentation Team Amazon EMR Release Guide (Hardcover)
Documentation Team
R3,107 Discovery Miles 31 070 Ships in 10 - 15 working days
CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,362 Discovery Miles 13 620 Ships in 12 - 19 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Amazon Pinpoint Developer Guide (Hardcover): Documentation Team Amazon Pinpoint Developer Guide (Hardcover)
Documentation Team
R1,238 Discovery Miles 12 380 Ships in 10 - 15 working days
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover): Gregory B White,... Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover)
Gregory B White, Natalie Sjelin
R5,743 Discovery Miles 57 430 Ships in 10 - 15 working days

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.

Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition): R. Anderson Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition)
R. Anderson
R1,504 R1,380 Discovery Miles 13 800 Save R124 (8%) Ships in 12 - 19 working days

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?

Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation (Hardcover): Gohar Sargsyan,... Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation (Hardcover)
Gohar Sargsyan, Dimitrios Kavallieros, Nicholas Kolokotronis
R2,369 Discovery Miles 23 690 Ships in 10 - 15 working days

The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project's methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics.

AWS CodeStar User Guide (Hardcover): Documentation Team AWS CodeStar User Guide (Hardcover)
Documentation Team
R1,238 Discovery Miles 12 380 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Principles, Methodologies, and…
Xiaoyu Yang, Lu Liu Hardcover R5,143 Discovery Miles 51 430
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,115 R950 Discovery Miles 9 500
Internet of Things - A Hands-On Approach
Arshdeep Bahga, Vijay Madisetti Hardcover R1,678 R1,135 Discovery Miles 11 350
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Agile Project Management - The Complete…
Greg Caldwell Hardcover R800 R700 Discovery Miles 7 000
Visualizing Information Using SVG and…
Vladimir Geroimenko, Chaomei Chen Hardcover R4,396 Discovery Miles 43 960
The API-First Transformation
Kin Lane Hardcover R1,401 Discovery Miles 14 010
Apache HTTP Server Documentation Version…
Apache Software Foundation Hardcover R1,795 Discovery Miles 17 950
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R971 R833 Discovery Miles 8 330
Aws - The Most Complete Guide to Learn…
Robert Campbell Hardcover R850 R738 Discovery Miles 7 380

 

Partners