0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,629)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover): Suyel Namasudra, Hamid Sarbazi-Azad Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover)
Suyel Namasudra, Hamid Sarbazi-Azad
R4,212 Discovery Miles 42 120 Ships in 10 - 15 working days

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,380 Discovery Miles 53 800 Ships in 18 - 22 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback): Kevvie Fowler Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback)
Kevvie Fowler
R1,374 Discovery Miles 13 740 Ships in 10 - 15 working days

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R6,677 Discovery Miles 66 770 Ships in 18 - 22 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,161 Discovery Miles 71 610 Ships in 18 - 22 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

AWS X-Ray Developer Guide (Hardcover): Development Team AWS X-Ray Developer Guide (Hardcover)
Development Team
R1,190 Discovery Miles 11 900 Ships in 18 - 22 working days
Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
AWS CodeCommit User Guide (Hardcover): Documentation Team AWS CodeCommit User Guide (Hardcover)
Documentation Team
R1,201 Discovery Miles 12 010 Ships in 18 - 22 working days
AWS Migration Hub User Guide (Hardcover): Documentation Team AWS Migration Hub User Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback): Sushil K. Prasad,... Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback)
Sushil K. Prasad, Anshul Gupta, Arnold L. Rosenberg, Alan Sussman, Charles C Weems, Jr.
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.

AWS Step Functions Developer Guide (Hardcover): Documentation Team AWS Step Functions Developer Guide (Hardcover)
Documentation Team
R1,156 Discovery Miles 11 560 Ships in 18 - 22 working days
GPU-based Parallel Implementation of Swarm Intelligence Algorithms (Paperback): Ying Tan GPU-based Parallel Implementation of Swarm Intelligence Algorithms (Paperback)
Ying Tan
R2,065 Discovery Miles 20 650 Ships in 10 - 15 working days

GPU-based Parallel Implementation of Swarm Intelligence Algorithms combines and covers two emerging areas attracting increased attention and applications: graphics processing units (GPUs) for general-purpose computing (GPGPU) and swarm intelligence. This book not only presents GPGPU in adequate detail, but also includes guidance on the appropriate implementation of swarm intelligence algorithms on the GPU platform. GPU-based implementations of several typical swarm intelligence algorithms such as PSO, FWA, GA, DE, and ACO are presented and having described the implementation details including parallel models, implementation considerations as well as performance metrics are discussed. Finally, several typical applications of GPU-based swarm intelligence algorithms are presented. This valuable reference book provides a unique perspective not possible by studying either GPGPU or swarm intelligence alone. This book gives a complete and whole picture for interested readers and new comers who will find many implementation algorithms in the book suitable for immediate use in their projects. Additionally, some algorithms can also be used as a starting point for further research.

AWS Organizations User Guide (Hardcover): Documentation Team AWS Organizations User Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Internet Congestion Control (Paperback): Subir Varma Internet Congestion Control (Paperback)
Subir Varma
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.

Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction (Hardcover): Sam Takavarasha Jr, Carl... Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction (Hardcover)
Sam Takavarasha Jr, Carl Adams
R4,902 Discovery Miles 49 020 Ships in 18 - 22 working days

As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction is a relevant scholarly publication that examines the importance of information and communications technology (ICT) and its ability to aid in developing countries and the methods to make such technologies more accessible and cost less. Featuring coverage on a wide range of topics, including community networks, infrastructure sharing, and the digital divide, this book is geared toward academics, technology developers, researchers, students, practitioners, and professionals interested in the importance of understanding technological innovations.

Open and Equal Access for Learning in School Management (Hardcover): Fahriye Altinay Open and Equal Access for Learning in School Management (Hardcover)
Fahriye Altinay
R3,104 Discovery Miles 31 040 Ships in 18 - 22 working days
Wireless Public Safety Networks Volume 1 - Overview and Challenges (Hardcover): Daniel Camara, Navid Nikaein Wireless Public Safety Networks Volume 1 - Overview and Challenges (Hardcover)
Daniel Camara, Navid Nikaein
R2,674 Discovery Miles 26 740 Ships in 10 - 15 working days

Wireless Public Safety Networks, Volume One: Overview and Challenges presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or as support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. Wireless Public Safety Networks examines past communication failures that have directly contributed to the loss of lives. This book will give readers a broad view of the PSNs field, analyzing the benefits PSNs may bring to society, the main challenges related to the establishment and maintenance of these networks, the latest advancements in the field, and future perspectives.

Amazon Inspector User Guide (Hardcover): Documentation Team Amazon Inspector User Guide (Hardcover)
Documentation Team
R886 Discovery Miles 8 860 Ships in 18 - 22 working days
Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback): I.S. Dr. Amiri, M. R. K. Soltanian Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback)
I.S. Dr. Amiri, M. R. K. Soltanian
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover)
Information R Management Association
R13,760 Discovery Miles 137 600 Ships in 18 - 22 working days
A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Engineering Design under Uncertainty and…
Chao Hu, Byeng D. Youn, … Hardcover R4,735 Discovery Miles 47 350
Essential
Dougie MacLean CD R584 Discovery Miles 5 840
Computational Aspects and Applications…
Valery A. Kalyagin, Panos M. Pardalos, … Hardcover R2,702 Discovery Miles 27 020
Shadow Kingdom
Bob Dylan CD R454 R408 Discovery Miles 4 080
The Fibonacci Resonance and Other New…
Clive N. Menhinick Hardcover R1,421 Discovery Miles 14 210
Ultimate House Party
Various Artists CD R172 R162 Discovery Miles 1 620
Live at the Union Chapel, London
Billy Bragg CD R439 Discovery Miles 4 390
Ceol Mor Ceol Beag
Iain Macfadyen CD R412 Discovery Miles 4 120
Fiddler's Party
Scottish Fiddle Orchestra CD R412 Discovery Miles 4 120
Ordinal Time Series Analysis…
Timothy Ruefli Hardcover R2,811 R2,545 Discovery Miles 25 450

 

Partners