0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (251)
  • R250 - R500 (859)
  • R500+ (13,652)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover): Information Resources Management Association Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover)
Information Resources Management Association
R11,898 Discovery Miles 118 980 Ships in 18 - 22 working days

In recent years, smart cities have been an emerging area of interest across the world. Due to this, numerous technologies and tools, such as building information modeling (BIM) and digital twins, have been developed to help achieve smart cities. To ensure research is continuously up to date and new technologies are considered within the field, further study is required. The Research Anthology on BIM and Digital Twins in Smart Cities considers the uses, challenges, and opportunities of BIM and digital twins within smart cities. Covering key topics such as data, design, urban areas, technology, and sustainability, this major reference work is ideal for industry professionals, government officials, computer scientists, policymakers, researchers, scholars, practitioners, instructors, and students.

Amazon CloudWatch Logs User Guide (Hardcover): Documentation Team Amazon CloudWatch Logs User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,380 Discovery Miles 53 800 Ships in 18 - 22 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Trusted Platform Modules - Why, when and how to use them (Hardcover): Ariel Segall Trusted Platform Modules - Why, when and how to use them (Hardcover)
Ariel Segall
R2,849 R2,589 Discovery Miles 25 890 Save R260 (9%) Ships in 18 - 22 working days

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation. This book describes the primary uses for TPMs, and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system. Topics covered include when to use a TPM; TPM concepts and functionality; programming introduction; provisioning: getting the TPM ready to use; first steps: TPM keys; machine authentication; data protection; attestation; other TPM features; software and specifications; and troubleshooting. Appendices contain basic cryptographic concepts; command equivalence and requirements charts; and complete code samples.

Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,377 Discovery Miles 23 770 Ships in 10 - 15 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Design and Use of Virtualization Technology in Cloud Computing (Hardcover): Prashanta Kumar Das, Ganesh Chandra Deka Design and Use of Virtualization Technology in Cloud Computing (Hardcover)
Prashanta Kumar Das, Ganesh Chandra Deka
R5,771 Discovery Miles 57 710 Ships in 18 - 22 working days

Cloud computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Design and Use of Virtualization Technology in Cloud Computing is a crucial resource that provides in-depth discussions on the background of virtualization, and the ways it can help shape the future of cloud computing technologies. Highlighting relevant topics including grid computing, mobile computing, open source virtualization, and virtualization in education, this scholarly reference source is ideal for computer engineers, academicians, students, and researchers that are interested in learning more about how to infuse current cloud computing technologies with virtualization advancements.

Open and Equal Access for Learning in School Management (Hardcover): Fahriye Altinay Open and Equal Access for Learning in School Management (Hardcover)
Fahriye Altinay
R3,104 Discovery Miles 31 040 Ships in 18 - 22 working days
AWS Encryption SDK Developer Guide (Hardcover): Documentation Team AWS Encryption SDK Developer Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover): Suyel Namasudra, Hamid Sarbazi-Azad Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover)
Suyel Namasudra, Hamid Sarbazi-Azad
R4,212 Discovery Miles 42 120 Ships in 10 - 15 working days

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,161 Discovery Miles 71 610 Ships in 18 - 22 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R6,677 Discovery Miles 66 770 Ships in 18 - 22 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback): Sushil K. Prasad,... Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback)
Sushil K. Prasad, Anshul Gupta, Arnold L. Rosenberg, Alan Sussman, Charles C Weems, Jr.
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.

AWS Secrets Manager User Guide (Hardcover): Documentation Team AWS Secrets Manager User Guide (Hardcover)
Documentation Team
R1,158 Discovery Miles 11 580 Ships in 18 - 22 working days
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover): Amit Kumar Tyagi Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover)
Amit Kumar Tyagi
R8,044 Discovery Miles 80 440 Ships in 18 - 22 working days

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.

AWS Direct Connect User Guide (Hardcover): Documentation Team AWS Direct Connect User Guide (Hardcover)
Documentation Team
R891 Discovery Miles 8 910 Ships in 18 - 22 working days
Internet Congestion Control (Paperback): Subir Varma Internet Congestion Control (Paperback)
Subir Varma
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.

Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction (Hardcover): Sam Takavarasha Jr, Carl... Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction (Hardcover)
Sam Takavarasha Jr, Carl Adams
R4,902 Discovery Miles 49 020 Ships in 18 - 22 working days

As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction is a relevant scholarly publication that examines the importance of information and communications technology (ICT) and its ability to aid in developing countries and the methods to make such technologies more accessible and cost less. Featuring coverage on a wide range of topics, including community networks, infrastructure sharing, and the digital divide, this book is geared toward academics, technology developers, researchers, students, practitioners, and professionals interested in the importance of understanding technological innovations.

Amazon Sumerian User Guide (Hardcover): Documentation Team Amazon Sumerian User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Modern Cryptography - Current Challenges and Solutions (Hardcover): Menachem Domb Modern Cryptography - Current Challenges and Solutions (Hardcover)
Menachem Domb
R3,059 Discovery Miles 30 590 Ships in 18 - 22 working days
Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback): Vasileios Karyotis, M. H. R.... Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback)
Vasileios Karyotis, M. H. R. Khouzani
R2,293 R2,171 Discovery Miles 21 710 Save R122 (5%) Ships in 10 - 15 working days

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Electronic Hive Minds on Social Media - Emerging Research and Opportunities (Hardcover): Shalin Hai-Jew Electronic Hive Minds on Social Media - Emerging Research and Opportunities (Hardcover)
Shalin Hai-Jew
R5,104 Discovery Miles 51 040 Ships in 18 - 22 working days

Researchers have harnessed the flood of personal information and opinions shared on social media platforms in a variety of ways. People communicate not only what they imagine they are purposely sharing but also unintentionally leak information, which allows others to glimpse a sense of the subconscious and unconscious at a macro level. Electronic Hive Minds on Social Media: Emerging Research and Opportunities explores various research techniques to profile the electronic hive mind around social topics as expressed on various modalities of social media, from human, bot, and cyborg social media accounts, and proposes new research methods for harnessing public data from social media platforms. Highlighting topics such as knowledge sharing, swarm intelligence, and social psychology, this publication is designed for researchers, social psychologists, practitioners, and students in marketing, communications, mass media, and similar fields.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Quality Of Mercy
Siphiwe Gloria Ndlovu Paperback R340 R314 Discovery Miles 3 140
Book Lovers
Emily Henry Paperback  (4)
R275 R254 Discovery Miles 2 540
Building Tightly Integrated Software…
Manfred Nagl Paperback R2,971 Discovery Miles 29 710
GNU LibreJS Reference Manual
Loic J Duros Paperback R476 Discovery Miles 4 760
The Schoolhouse
Sophie Ward Paperback R429 R309 Discovery Miles 3 090
The Netanyahus
Joshua Cohen Paperback R256 R232 Discovery Miles 2 320
Zeus Van Wyngaardt En Die Skrikgodin
Julio Agrella Paperback R333 Discovery Miles 3 330
The Lost Boys
Faye Kellerman Paperback R330 R227 Discovery Miles 2 270
NES/Famicom: a visual compendium
Bitmap Books Hardcover R1,253 Discovery Miles 12 530
The Boat Runner
Devin Murphy Paperback R374 R340 Discovery Miles 3 400

 

Partners