0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (849)
  • R500+ (14,095)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,776 Discovery Miles 57 760 Ships in 10 - 15 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Amazon Simple Queue Service Developer Guide (Hardcover): Documentation Team Amazon Simple Queue Service Developer Guide (Hardcover)
Documentation Team
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days
Security and Privacy for Big Data, Cloud Computing and Applications (Hardcover): Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo,... Security and Privacy for Big Data, Cloud Computing and Applications (Hardcover)
Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa
R3,624 R3,266 Discovery Miles 32 660 Save R358 (10%) Ships in 10 - 15 working days

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.

Impact of Digital Transformation on Security Policies and Standards (Hardcover): Sam Goundar, S. Bharath Bhushan, Vaishali... Impact of Digital Transformation on Security Policies and Standards (Hardcover)
Sam Goundar, S. Bharath Bhushan, Vaishali Ravindra Thakare
R6,438 Discovery Miles 64 380 Ships in 10 - 15 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Smart Technologies - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Smart Technologies - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R9,165 Discovery Miles 91 650 Ships in 10 - 15 working days

Ongoing advancements in modern technology have led to significant developments with smart technologies. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Smart Technologies: Breakthroughs in Research and Practice provides comprehensive and interdisciplinary research on the most emerging areas of information science and technology. Including innovative studies on image and speech recognition, human-computer interface, and wireless technologies, this multi-volume book is an ideal source for researchers, academicians, practitioners, and students interested in advanced technological applications and developments.

Privacy and Legal Issues in Cloud Computing (Paperback): Anne S.Y. Cheung, Rolf H. Weber Privacy and Legal Issues in Cloud Computing (Paperback)
Anne S.Y. Cheung, Rolf H. Weber
R1,437 Discovery Miles 14 370 Ships in 12 - 19 working days

Using a multi-disciplinary and comparative approach, this study examines emerging and innovative attempts to tackle privacy and legal issues in cloud computing such as personal data privacy, security and intellectual property protection. An international team of legal scholars, computer science researchers, regulators and practitioners present original and critical responses to the growing challenges posed by cloud computing. They analyze the specific legal implications pertaining to jurisdiction, biomedical practice and information ownership, as well as issues of regulatory control, competition and cross-border regulation. Law academics, practitioners and regulators will find this book to be a valuable, practical and accessible resource, as will computer science scholars interested in cloud computing issues. Contributors: H. Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y. Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny, C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu

Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover)
Information R Management Association
R14,917 Discovery Miles 149 170 Ships in 10 - 15 working days
Amazon Simple Email Service Developer Guide (Hardcover): Documentation Team Amazon Simple Email Service Developer Guide (Hardcover)
Documentation Team
R2,489 Discovery Miles 24 890 Ships in 10 - 15 working days
Research Anthology on Privatizing and Securing Data, VOL 1 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 1 (Hardcover)
Information R Management Association
R14,930 Discovery Miles 149 300 Ships in 10 - 15 working days
Amazon Elastic Compute Cloud User Guide for Linux Instances (Hardcover): Documentation Team Amazon Elastic Compute Cloud User Guide for Linux Instances (Hardcover)
Documentation Team
R3,165 Discovery Miles 31 650 Ships in 10 - 15 working days
Complex Systems and Clouds - A Self-Organization and Self-Management Perspective (Paperback): Dan C. Marinescu Complex Systems and Clouds - A Self-Organization and Self-Management Perspective (Paperback)
Dan C. Marinescu
R842 Discovery Miles 8 420 Ships in 12 - 19 working days

Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Large scale distributed computer systems have evolved into very complex systems and are at the point where they need to borrow self-adapting organizing concepts from nature. The book explores complexity in big distributed systems and in the natural processes in physics and chemistry, building a platform for understanding how self-organization in big distributed systems can be achieved. It goes beyond the theoretical description of self-organization to present principles for designing self-organizing systems, and concludes by showing the need for a paradigm shift in the development of large-scale systems from strictly deterministic to non-deterministic and adaptive.

Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,506 Discovery Miles 25 060 Ships in 10 - 15 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Cyber-Physical Systems - Foundations, Principles and Applications (Paperback): Houbing Song, Danda B. Rawat, Sabina Jeschke,... Cyber-Physical Systems - Foundations, Principles and Applications (Paperback)
Houbing Song, Danda B. Rawat, Sabina Jeschke, Christian Brecher
R2,667 R2,514 Discovery Miles 25 140 Save R153 (6%) Ships in 12 - 19 working days

Cyber-Physical Systems: Foundations, Principles and Applications explores the core system science perspective needed to design and build complex cyber-physical systems. Using Systems Science's underlying theories, such as probability theory, decision theory, game theory, organizational sociology, behavioral economics, and cognitive psychology, the book addresses foundational issues central across CPS applications, including System Design -- How to design CPS to be safe, secure, and resilient in rapidly evolving environments, System Verification -- How to develop effective metrics and methods to verify and certify large and complex CPS, Real-time Control and Adaptation -- How to achieve real-time dynamic control and behavior adaptation in a diverse environments, such as clouds and in network-challenged spaces, Manufacturing -- How to harness communication, computation, and control for developing new products, reducing product concepts to realizable designs, and producing integrated software-hardware systems at a pace far exceeding today's timeline. The book is part of the Intelligent Data-Centric Systems: Sensor-Collected Intelligence series edited by Fatos Xhafa, Technical University of Catalonia. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Trusted Platform Modules - Why, when and how to use them (Hardcover): Ariel Segall Trusted Platform Modules - Why, when and how to use them (Hardcover)
Ariel Segall
R3,093 R2,805 Discovery Miles 28 050 Save R288 (9%) Ships in 10 - 15 working days

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation. This book describes the primary uses for TPMs, and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system. Topics covered include when to use a TPM; TPM concepts and functionality; programming introduction; provisioning: getting the TPM ready to use; first steps: TPM keys; machine authentication; data protection; attestation; other TPM features; software and specifications; and troubleshooting. Appendices contain basic cryptographic concepts; command equivalence and requirements charts; and complete code samples.

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,228 Discovery Miles 12 280 Ships in 10 - 15 working days
Design and Use of Virtualization Technology in Cloud Computing (Hardcover): Prashanta Kumar Das, Ganesh Chandra Deka Design and Use of Virtualization Technology in Cloud Computing (Hardcover)
Prashanta Kumar Das, Ganesh Chandra Deka
R6,259 Discovery Miles 62 590 Ships in 10 - 15 working days

Cloud computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Design and Use of Virtualization Technology in Cloud Computing is a crucial resource that provides in-depth discussions on the background of virtualization, and the ways it can help shape the future of cloud computing technologies. Highlighting relevant topics including grid computing, mobile computing, open source virtualization, and virtualization in education, this scholarly reference source is ideal for computer engineers, academicians, students, and researchers that are interested in learning more about how to infuse current cloud computing technologies with virtualization advancements.

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,681 R2,468 Discovery Miles 24 680 Save R213 (8%) Ships in 12 - 19 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

AWS Directory Service Administration Guide (Hardcover): Documentation Team AWS Directory Service Administration Guide (Hardcover)
Documentation Team
R1,826 Discovery Miles 18 260 Ships in 10 - 15 working days
Channel Coding: Theory, Algorithms, and Applications - Academic Press Library in Mobile and Wireless Communications... Channel Coding: Theory, Algorithms, and Applications - Academic Press Library in Mobile and Wireless Communications (Paperback)
David Declercq, Marc Fossorier, Ezio Biglieri
R3,553 R3,320 Discovery Miles 33 200 Save R233 (7%) Ships in 12 - 19 working days

This book gives a review of the principles, methods and techniques of important and emerging research topics and technologies in Channel Coding, including theory, algorithms, and applications. Edited by leading people in the field who, through their reputation, have been able to commission experts to write on a particular topic. With this reference source you will: Quickly grasp a new area of research Understand the underlying principles of a topic and its applications Ascertain how a topic relates to other areas and learn of the research issues yet to be resolved

Autonomic Network Management Principles - From Concepts to Applications (Paperback): Nazim Agoulmine Autonomic Network Management Principles - From Concepts to Applications (Paperback)
Nazim Agoulmine
R1,952 Discovery Miles 19 520 Ships in 12 - 19 working days

Autonomic networking aims to solve the mounting problems created by increasingly complex networks, by enabling devices and service-providers to decide, preferably without human intervention, what to do at any given moment, and ultimately to create self-managing networks that can interface with each other, adapting their behavior to provide the best service to the end-user in all situations. This book gives both an understanding and an assessment of the principles, methods and architectures in autonomous network management, as well as lessons learned from, the ongoing initiatives in the field. It includes contributions from industry groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and leading universities. These groups all provide chapters examining the international research projects to which they are contributing, such as the EU Autonomic Network Architecture Project and Ambient Networks EU Project, reviewing current developments and demonstrating how autonomic management principles are used to define new architectures, models, protocols, and mechanisms for future network equipment.

Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover): Veljko Milutinovic, Milos Kotlar Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover)
Veljko Milutinovic, Milos Kotlar
R10,065 Discovery Miles 100 650 Ships in 10 - 15 working days

As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing.

Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover)
Edmond K. Machie
R1,803 Discovery Miles 18 030 Ships in 12 - 19 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Network Function Virtualization (Paperback): Ken Gray, Thomas D Nadeau Network Function Virtualization (Paperback)
Ken Gray, Thomas D Nadeau
R1,492 R1,350 Discovery Miles 13 500 Save R142 (10%) Ships in 12 - 19 working days

Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an enterprise, and learn how to evaluate all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight.

Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,308 Discovery Miles 33 080 Ships in 10 - 15 working days
Cyber Security (Hardcover): Yu Zhou, Jia Li, Li Ding Cyber Security (Hardcover)
Yu Zhou, Jia Li, Li Ding
R1,401 Discovery Miles 14 010 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Freelance Web Developer 101 - How to…
Howexpert, Liz Kazandzhy Hardcover R786 Discovery Miles 7 860
Essential SQA Exam Practice: National 5…
Lesley Russell Paperback R389 Discovery Miles 3 890
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire Hardcover R6,675 Discovery Miles 66 750
Digital Production, Design and…
Sonia Stuart, Maureen Everett Paperback R1,280 Discovery Miles 12 800
The JR Programming Language - Concurrent…
Ronald A Olsson, Aaron W. Keen Hardcover R1,749 Discovery Miles 17 490
Level 1/Level 2 Cambridge National in…
Kevin Wells, Sarah McAtominey, … Paperback R1,073 Discovery Miles 10 730
Divatastic Be's A Girl's Guidebook to…
Nancy Franklin-Wright Hardcover R591 Discovery Miles 5 910
Representation & Reasoning - How…
Readyai Hardcover R631 Discovery Miles 6 310
Pearson REVISE BTEC Tech Award Digital…
Alan Jarvis Digital product license key R285 Discovery Miles 2 850
XML in Data Management - Understanding…
Peter Aiken, M. David Allen Paperback R1,218 Discovery Miles 12 180

 

Partners