0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (329)
  • R250 - R500 (866)
  • R500+ (14,046)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,813 Discovery Miles 58 130 Ships in 12 - 17 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,702 Discovery Miles 77 020 Ships in 12 - 17 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Cyberspace (Hardcover): Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid Cyberspace (Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
R3,336 Discovery Miles 33 360 Ships in 10 - 15 working days
The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover): Niels Starling The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover)
Niels Starling
R732 Discovery Miles 7 320 Ships in 12 - 17 working days
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,732 Discovery Miles 57 320 Ships in 10 - 15 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

AWS Migration Hub User Guide (Hardcover): Documentation Team AWS Migration Hub User Guide (Hardcover)
Documentation Team
R968 Discovery Miles 9 680 Ships in 10 - 15 working days
Cybersecurity Data Science - Best Practices in an Emerging Profession (Hardcover, 1st ed. 2021): Scott Mongeau, Andrzej... Cybersecurity Data Science - Best Practices in an Emerging Profession (Hardcover, 1st ed. 2021)
Scott Mongeau, Andrzej Hajdasinski
R4,092 Discovery Miles 40 920 Ships in 12 - 17 working days

This book encompasses a systematic exploration of Cybersecurity Data Science (CSDS) as an emerging profession, focusing on current versus idealized practice. This book also analyzes challenges facing the emerging CSDS profession, diagnoses key gaps, and prescribes treatments to facilitate advancement. Grounded in the management of information systems (MIS) discipline, insights derive from literature analysis and interviews with 50 global CSDS practitioners. CSDS as a diagnostic process grounded in the scientific method is emphasized throughout Cybersecurity Data Science (CSDS) is a rapidly evolving discipline which applies data science methods to cybersecurity challenges. CSDS reflects the rising interest in applying data-focused statistical, analytical, and machine learning-driven methods to address growing security gaps. This book offers a systematic assessment of the developing domain. Advocacy is provided to strengthen professional rigor and best practices in the emerging CSDS profession. This book will be of interest to a range of professionals associated with cybersecurity and data science, spanning practitioner, commercial, public sector, and academic domains. Best practices framed will be of interest to CSDS practitioners, security professionals, risk management stewards, and institutional stakeholders. Organizational and industry perspectives will be of interest to cybersecurity analysts, managers, planners, strategists, and regulators. Research professionals and academics are presented with a systematic analysis of the CSDS field, including an overview of the state of the art, a structured evaluation of key challenges, recommended best practices, and an extensive bibliography.

Amazon EC2 Auto Scaling User Guide (Hardcover): Documentation Team Amazon EC2 Auto Scaling User Guide (Hardcover)
Documentation Team
R1,255 Discovery Miles 12 550 Ships in 10 - 15 working days
Digital Twin Technology (Paperback): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Paperback)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R1,404 Discovery Miles 14 040 Ships in 12 - 17 working days
Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,863 Discovery Miles 98 630 Ships in 10 - 15 working days
The Future of Open Data (Hardcover): Pamela Robinson, Teresa Scassa The Future of Open Data (Hardcover)
Pamela Robinson, Teresa Scassa
R1,258 Discovery Miles 12 580 Ships in 12 - 17 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,857 Discovery Miles 98 570 Ships in 10 - 15 working days
Deep Learning AMI Developer Guide (Hardcover): Documentation Team Deep Learning AMI Developer Guide (Hardcover)
Documentation Team
R1,275 Discovery Miles 12 750 Ships in 10 - 15 working days
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback): J Minella Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback)
J Minella
R900 Discovery Miles 9 000 Ships in 12 - 17 working days

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage--including data published for the first time--of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies Effective technical resources and real-world sample architectures Explorations of the relationships between security, wireless, and network elements Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Data Governance Success - Growing and Sustaining Data Governance (Hardcover, 1st ed. 2021): Rupa Mahanti Data Governance Success - Growing and Sustaining Data Governance (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,262 Discovery Miles 22 620 Ships in 12 - 17 working days

While good data is an enterprise asset, bad data is an enterprise liability. Data governance enables you to effectively and proactively manage data assets throughout the enterprise by providing guidance in the form of policies, standards, processes and rules and defining roles and responsibilities outlining who will do what, with respect to data. While implementing data governance is not rocket science, it is not a simple exercise. There is a lot confusion around what data governance is, and a lot of challenges in the implementation of data governance. Data governance is not a project or a one-off exercise but a journey that involves a significant amount of effort, time and investment and cultural change and a number of factors to take into consideration to achieve and sustain data governance success. Data Governance Success: Growing and Sustaining Data Governance is the third and final book in the Data Governance series and discusses the following: * Data governance perceptions and challenges * Key considerations when implementing data governance to achieve and sustain success* Strategy and data governance* Different data governance maturity frameworks* Data governance - people and process elements* Data governance metrics This book shares the combined knowledge related to data and data governance that the author has gained over the years of working in different industrial and research programs and projects associated with data, processes, and technologies and unique perspectives of Thought Leaders and Data Experts through Interviews conducted. This book will be highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge to support and succeed in data governance implementations. This book is technology agnostic and contains a balance of concepts and examples and illustrations making it easy for the readers to understand and relate to their own specific data projects.

AWS Elemental MediaConvert User Guide (Hardcover): Documentation Team AWS Elemental MediaConvert User Guide (Hardcover)
Documentation Team
R965 Discovery Miles 9 650 Ships in 10 - 15 working days
Linux Command Line and Shell Scripting Bible, Fourth Edition (Paperback, 4th Edition): R. Blum Linux Command Line and Shell Scripting Bible, Fourth Edition (Paperback, 4th Edition)
R. Blum
R964 Discovery Miles 9 640 Ships in 12 - 17 working days

Advance your understanding of the Linux command line with this invaluable resource Linux Command Line and Shell Scripting Bible, 4th Edition is the newest installment in the indispensable series known to Linux developers all over the world. Packed with concrete strategies and practical tips, the latest edition includes brand-new content covering: Understanding the Shell Writing Simple Script Utilities Producing Database, Web & Email Scripts Creating Fun Little Shell Scripts Written by accomplished Linux professionals Christine Bresnahan and Richard Blum, Linux Command Line and Shell Scripting Bible, 4th Edition teaches readers the fundamentals and advanced topics necessary for a comprehensive understanding of shell scripting in Linux. The book is filled with real-world examples and usable scripts, helping readers navigate the challenging Linux environment with ease and convenience. The book is perfect for anyone who uses Linux at home or in the office and will quickly find a place on every Linux enthusiast's bookshelf.

Selfies as a Mode of Social Media and Work Space Research (Hardcover): Shalin Hai-Jew Selfies as a Mode of Social Media and Work Space Research (Hardcover)
Shalin Hai-Jew
R4,982 Discovery Miles 49 820 Ships in 10 - 15 working days

The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.

Next Generation Wireless Network Security and Privacy (Hardcover): Kamaljit I Lakhtaria Next Generation Wireless Network Security and Privacy (Hardcover)
Kamaljit I Lakhtaria
R5,544 Discovery Miles 55 440 Ships in 12 - 17 working days

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,067 Discovery Miles 40 670 Ships in 12 - 17 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

AWS Glue Developer Guide (Hardcover): Documentation Team AWS Glue Developer Guide (Hardcover)
Documentation Team
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days
Sensemaking for Security (Hardcover, 1st ed. 2021): Anthony J. Masys Sensemaking for Security (Hardcover, 1st ed. 2021)
Anthony J. Masys
R4,077 Discovery Miles 40 770 Ships in 12 - 17 working days

This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.

AWS Schema Conversion Tool User Guide (Hardcover): Documentation Team AWS Schema Conversion Tool User Guide (Hardcover)
Documentation Team
R1,873 Discovery Miles 18 730 Ships in 10 - 15 working days
Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,685 Discovery Miles 66 850 Ships in 10 - 15 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,333 Discovery Miles 33 330 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,432 Discovery Miles 64 320
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,809 Discovery Miles 58 090
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,995 R2,937 Discovery Miles 29 370
Guide to Networking Essentials
Greg Tomsho Paperback R1,339 R1,246 Discovery Miles 12 460
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,410 Discovery Miles 84 100
Computer Networks, Global Edition
Andrew Tanenbaum, Nick Feamster, … Paperback R2,542 R2,378 Discovery Miles 23 780
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, … Hardcover R6,730 Discovery Miles 67 300
Two-Factor Authentication
Mark Stanislav Paperback R516 Discovery Miles 5 160
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,308 R1,219 Discovery Miles 12 190
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R8,638 Discovery Miles 86 380

 

Partners