0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (273)
  • R250 - R500 (876)
  • R500+ (13,595)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R11,891 Discovery Miles 118 910 Ships in 18 - 22 working days
Amazon Kinesis Video Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Video Streams Developer Guide (Hardcover)
Documentation Team
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days
Research Anthology on Advancements in Cybersecurity Education (Hardcover): Information Resources Management Association Research Anthology on Advancements in Cybersecurity Education (Hardcover)
Information Resources Management Association
R10,591 Discovery Miles 105 910 Ships in 18 - 22 working days

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover): William Vance Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover)
William Vance
R576 R530 Discovery Miles 5 300 Save R46 (8%) Ships in 18 - 22 working days
Smart Technologies - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Smart Technologies - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R8,448 Discovery Miles 84 480 Ships in 18 - 22 working days

Ongoing advancements in modern technology have led to significant developments with smart technologies. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Smart Technologies: Breakthroughs in Research and Practice provides comprehensive and interdisciplinary research on the most emerging areas of information science and technology. Including innovative studies on image and speech recognition, human-computer interface, and wireless technologies, this multi-volume book is an ideal source for researchers, academicians, practitioners, and students interested in advanced technological applications and developments.

Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,514 R2,377 Discovery Miles 23 770 Save R137 (5%) Ships in 10 - 15 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Tools and Techniques for Software Development in Large Organizations - Emerging Research and Opportunities (Hardcover): Vishnu... Tools and Techniques for Software Development in Large Organizations - Emerging Research and Opportunities (Hardcover)
Vishnu Pendyala
R5,309 Discovery Miles 53 090 Ships in 18 - 22 working days

The development of software has expanded substantially in recent years. As these technologies continue to advance, well-known organizations have begun implementing these programs into the ways they conduct business. These large companies play a vital role in the economic environment, so understanding the software that they utilize is pertinent in many aspects. Researching and analyzing the tools that these corporations use will assist in the practice of software engineering and give other organizations an outline of how to successfully implement their own computational methods. Tools and Techniques for Software Development in Large Organizations: Emerging Research and Opportunities is an essential reference source that discusses advanced software methods that prominent companies have adopted to develop high quality products. This book will examine the various devices that organizations such as Google, Cisco, and Facebook have implemented into their production and development processes. Featuring research on topics such as database management, quality assurance, and machine learning, this book is ideally designed for software engineers, data scientists, developers, programmers, professors, researchers, and students seeking coverage on the advancement of software devices in today's major corporations.

RFID and Wireless Sensors Using Ultra-Wideband Technology (Hardcover): Angel Ramos, Antonio Lazaro, David Girbau, Ramon... RFID and Wireless Sensors Using Ultra-Wideband Technology (Hardcover)
Angel Ramos, Antonio Lazaro, David Girbau, Ramon Villarino
R2,463 R2,324 Discovery Miles 23 240 Save R139 (6%) Ships in 10 - 15 working days

RFID and Wireless Sensors using Ultra-Wideband Technology explores how RFID-based technologies are becoming the first choice to realize the last (wireless) link in the chain between each element and the Internet due to their low cost and simplicity. Each day, more and more elements are being connected to the Internet of Things. In this book, ultra-wideband radio technology (in time domain) is exploited to realize this wireless link. Chipless, semi-passive and active RFID systems and wireless sensors and prototypes are proposed in terms of reader (setup and signal processing techniques) and tags (design, integration of sensors and performance). The authors include comprehensive theories, proposals of advanced techniques, and their implementation to help readers develop time-domain ultra-wideband radio technology for a variety of applications. This book is suitable for post-doctoral candidates, experienced researchers, and engineers developing RFID, tag antenna designs, chipless RFID, and sensor integration.

Wireless Public Safety Networks 2 - A Systematic Approach (Hardcover): Daniel Camara, Navid Nikaein Wireless Public Safety Networks 2 - A Systematic Approach (Hardcover)
Daniel Camara, Navid Nikaein
R2,677 Discovery Miles 26 770 Ships in 10 - 15 working days

Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. This book examines past communication failures that have directly contributed to the loss of lives, giving readers in-depth discussions of the public networks that impact emergency management, covering social media, crowdsourcing techniques, wearable wireless sensors, moving-cells scenarios, mobility management protocols, 5G networks, broadband networks, data dissemination, and the resources of the frequency spectrum.

Amazon WorkMail User Guide (Hardcover): Documentation Team Amazon WorkMail User Guide (Hardcover)
Documentation Team
R885 Discovery Miles 8 850 Ships in 18 - 22 working days
Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,520 R2,325 Discovery Miles 23 250 Save R195 (8%) Ships in 10 - 15 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover): Information Resources Management Association Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover)
Information Resources Management Association
R11,898 Discovery Miles 118 980 Ships in 18 - 22 working days

In recent years, smart cities have been an emerging area of interest across the world. Due to this, numerous technologies and tools, such as building information modeling (BIM) and digital twins, have been developed to help achieve smart cities. To ensure research is continuously up to date and new technologies are considered within the field, further study is required. The Research Anthology on BIM and Digital Twins in Smart Cities considers the uses, challenges, and opportunities of BIM and digital twins within smart cities. Covering key topics such as data, design, urban areas, technology, and sustainability, this major reference work is ideal for industry professionals, government officials, computer scientists, policymakers, researchers, scholars, practitioners, instructors, and students.

Amazon CloudWatch Logs User Guide (Hardcover): Documentation Team Amazon CloudWatch Logs User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Trusted Platform Modules - Why, when and how to use them (Hardcover): Ariel Segall Trusted Platform Modules - Why, when and how to use them (Hardcover)
Ariel Segall
R2,849 R2,589 Discovery Miles 25 890 Save R260 (9%) Ships in 18 - 22 working days

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation. This book describes the primary uses for TPMs, and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system. Topics covered include when to use a TPM; TPM concepts and functionality; programming introduction; provisioning: getting the TPM ready to use; first steps: TPM keys; machine authentication; data protection; attestation; other TPM features; software and specifications; and troubleshooting. Appendices contain basic cryptographic concepts; command equivalence and requirements charts; and complete code samples.

Design and Use of Virtualization Technology in Cloud Computing (Hardcover): Prashanta Kumar Das, Ganesh Chandra Deka Design and Use of Virtualization Technology in Cloud Computing (Hardcover)
Prashanta Kumar Das, Ganesh Chandra Deka
R5,771 Discovery Miles 57 710 Ships in 18 - 22 working days

Cloud computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Design and Use of Virtualization Technology in Cloud Computing is a crucial resource that provides in-depth discussions on the background of virtualization, and the ways it can help shape the future of cloud computing technologies. Highlighting relevant topics including grid computing, mobile computing, open source virtualization, and virtualization in education, this scholarly reference source is ideal for computer engineers, academicians, students, and researchers that are interested in learning more about how to infuse current cloud computing technologies with virtualization advancements.

AWS Encryption SDK Developer Guide (Hardcover): Documentation Team AWS Encryption SDK Developer Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover): Suyel Namasudra, Hamid Sarbazi-Azad Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover)
Suyel Namasudra, Hamid Sarbazi-Azad
R4,212 Discovery Miles 42 120 Ships in 10 - 15 working days

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,380 Discovery Miles 53 800 Ships in 18 - 22 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R6,677 Discovery Miles 66 770 Ships in 18 - 22 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,161 Discovery Miles 71 610 Ships in 18 - 22 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 18 - 22 working days
Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback): Sushil K. Prasad,... Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback)
Sushil K. Prasad, Anshul Gupta, Arnold L. Rosenberg, Alan Sussman, Charles C Weems, Jr.
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Network Science - Analysis and…
CAR Pinheiro Hardcover R2,245 Discovery Miles 22 450

 

Partners