0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (340)
  • R250 - R500 (934)
  • R500+ (16,279)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Introduction to the Cyber Ranges (Hardcover): Bishwajeet Pandey, Shabeer Ahmad Introduction to the Cyber Ranges (Hardcover)
Bishwajeet Pandey, Shabeer Ahmad
R3,121 Discovery Miles 31 210 Ships in 9 - 15 working days

Introduction to the Cyber-Ranges aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing cyber ranges in leading urban sectors like military, academic and commercial. * Provides foundational know-how of Cyber Ranges, their types, roles * Focuses on architectural design * Presents a comparison between emulation and simulation Cyber Ranges * Discusses various use cases of exiting cyber ranges in Military, Academics and Commercial arenas

Cloud FinOps - Collaborative, Real-Time Cloud Financial Management (Paperback, 2nd edition): J R Storment, Mike Fuller Cloud FinOps - Collaborative, Real-Time Cloud Financial Management (Paperback, 2nd edition)
J R Storment, Mike Fuller
R2,185 R1,315 Discovery Miles 13 150 Save R870 (40%) Ships in 12 - 17 working days

FinOps brings financial accountability to the variable spend model of cloud. As enterprises move aggressively to cloud, ownership of technology and financial decision-making has shifted to the edges of the organization away from procurement to engineering, architecture, and product teams. FinOps, having grown from a fringe practice to the de facto discipline managing cloud spend, is now practiced by the majority of global enterprises. This second edition provides a road map for adopting and maturing the discipline drawn from the experience of hundreds of real-world practitioners. Seven new chapters include forecasting, adopting Finops, partnering with engineering, sustainability, the UI of FinOps, and connectivity to other frameworks. There are updates throughout the book, including 150 new pages of best practices and dozens of new stories. Drawing on real-world successes and failures of large-scale cloud spenders, the book outlines the process of building a culture of cloud FinOps in your organization. Engineering and finance teams, executives, and FinOps practitioners alike will learn how to build an efficient and effective FinOps machine for data-driven cloud value decision-making. With this book, you'll learn: The DNA of a highly functional cloud FinOps culture A road map to build executive support for FinOps adoption How to understand and forecast your cloud spending How to empower engineering and finance to work together Cost allocation strategies to create accountability for cloud and container spend Strategies for rate discounts from cloud commitments When and how to implement automation of repetitive cost tasks How to empower engineering team action on cost efficiency Using unit economics to drive data-driven decision-making

Cybersecurity and High-Performance Computing Environments - Integrated Innovations, Practices, and Applications (Hardcover):... Cybersecurity and High-Performance Computing Environments - Integrated Innovations, Practices, and Applications (Hardcover)
Kuan-Ching Li, Nitin Sukhija, Elizabeth Bautista, Jean-Luc Gaudiot
R3,004 Discovery Miles 30 040 Ships in 9 - 15 working days

Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent multifaceted anomalous and malicious characteristics.

Designing and Developing Secure Azure Solutions (Paperback): Michael Howard, Simone Curzi, Heinrich Gantenbein Designing and Developing Secure Azure Solutions (Paperback)
Michael Howard, Simone Curzi, Heinrich Gantenbein
R812 Discovery Miles 8 120 Ships in 12 - 17 working days

Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers- taking you from design and development to testing, deployment, governance, and compliance. About You This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible. Discover powerful new ways to: Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security

Telegeoinformatics - Location-Based Computing and Services (Hardcover): Hassan A. Karimi Telegeoinformatics - Location-Based Computing and Services (Hardcover)
Hassan A. Karimi
R5,114 Discovery Miles 51 140 Ships in 12 - 17 working days


Author Biography:
Dr. Hassan A. Karimi is Assistant Professor and Director of Geoinformatics Program in the Department of Information Science and Telecommunications at the University of Pittsburgh. His main research interests include geospatial information systems (GISs), Global Positioning System (GPS), remote sensing, location-based computing and services, mobile computing, spatial databases, spatial algorithms, computational geometry, parallel/distributed computing, and spatial uncertainty measurement and modelling.

Dr. Amin Hammad is a Visiting Scholar at Carnegie Mellon University and University of Pittsburgh. Prior to his current position, he was Assistant Professor in the Department of Civil Engineering of Nagoya University, Japan, for six years. His main research interest is the application of geomatics and mobile computing in civil engineering and urban planning.

Both editors have strong background in the theme of the proposed book. They have been actively engaged in research and teaching related to the subjects in the book.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,023 Discovery Miles 30 230 Ships in 12 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition (Paperback, 3rd Edition): M. Chapple (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition (Paperback, 3rd Edition)
M. Chapple
R1,105 Discovery Miles 11 050 Ships in 12 - 17 working days

The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. In this completely rewritten 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Cloud Concepts, Architecture and Design, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Cloud Security Operations, and Legal, Risk, and Compliance with real-world scenarios to help you apply your skills along the way. The CCSP credential from (ISC)2 and the Cloud Security Alliance is designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond. Review 100% of all CCSP exam objectives Practice applying essential concepts and skills Access the industry-leading online study tool set Test your knowledge with bonus practice exams and more As organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide gives you the tools and information you need to earn that certification and apply your skills in a real-world setting.

Networking Technologies in Smart Healthcare - Innovations and Analytical Approaches (Hardcover): Pooja Singh, Omprakash... Networking Technologies in Smart Healthcare - Innovations and Analytical Approaches (Hardcover)
Pooja Singh, Omprakash Kaiwartya, Nidhi Sindhwani, Vishal Jain, Rohit Anand
R4,299 Discovery Miles 42 990 Ships in 9 - 15 working days

This text provides novel smart network systems, wireless telecommunications infrastructures, and computing capabilities to help healthcare systems using computing techniques like IoT, cloud computing, machine and deep learning Big Data along with smart wireless networks. It discusses important topics, including robotics manipulation and analysis in smart healthcare industries, smart telemedicine framework using machine learning and deep learning, role of UAV and drones in smart hospitals, virtual reality based on 5G/6G and augmented reality in healthcare systems, data privacy and security, nanomedicine, and cloud-based artificial intelligence in healthcare systems. The book: * Discusses intelligent computing through IoT and Big Data in secure and smart healthcare systems. * Covers algorithms, including deterministic algorithms, randomized algorithms, iterative algorithms, and recursive algorithms. * Discusses remote sensing devices in hospitals and local health facilities for patient evaluation and care. * Covers wearable technology applications such as weight control and physical activity tracking for disease prevention and smart healthcare. This book will be useful for senior undergraduate, graduate students, and academic researchers in areas such as electrical engineering, electronics and communication engineering, computer science, and information technology. Discussing concepts of smart networks, advanced wireless communication, and technologies in setting up smart healthcare services, this text will be useful for senior undergraduate, graduate students, and academic researchers in areas such as electrical engineering, electronics and communication engineering, computer science, and information technology. It covers internet of things (IoT) implementation and challenges in healthcare industries, wireless network, and communication-based optimization algorithms for smart healthcare devices.

The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Paperback): Scott Coplan The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Paperback)
Scott Coplan
R1,240 Discovery Miles 12 400 Ships in 9 - 15 working days

When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.

Cryptocurrency Concepts, Technology, and Applications (Hardcover): Jay Liebowitz Cryptocurrency Concepts, Technology, and Applications (Hardcover)
Jay Liebowitz
R3,633 Discovery Miles 36 330 Ships in 12 - 17 working days

Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.

Cybertax - Managing the Risks and Results (Hardcover): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Hardcover)
George K. Tsantes, James Ransome
R3,008 Discovery Miles 30 080 Ships in 12 - 17 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

CompTIA Linux+ Study Guide - Exam XK0-005 (Paperback, 5th Edition): Richard Blum, Christine Bresnahan CompTIA Linux+ Study Guide - Exam XK0-005 (Paperback, 5th Edition)
Richard Blum, Christine Bresnahan
R1,203 R1,103 Discovery Miles 11 030 Save R100 (8%) Ships in 12 - 17 working days

The best-selling, hands-on roadmap to acing the new Linux+ exam In the newly updated Fifth Edition of CompTIA Linux+ Study Guide: Exam XK0-005, IT industry veterans and tech education gurus Richard Blum and Christine Bresnahan deliver a concise and practical blueprint to success on the CompTIA Linux+ exam and in your first role as a Linux network or system administrator. In the book, you'll find concrete strategies and proven techniques to master Linux system management, security, scripting, containers, automation, and troubleshooting. Every competency tested on the Linux+ exam is discussed here. You'll also get: Hands-on Linux advice that ensures you're job-ready on the first day of your new network or sysadmin role Test-taking tips and tactics that decrease exam anxiety and get you ready for the challenging Linux+ exam Complimentary access to the Sybex learning environment, complete with online test bank, bonus practice exams, electronic flashcards, and a searchable glossary Perfect for practicing network and system admins seeking an in-demand and valuable credential for working with Linux servers and computers, CompTIA Linux+ Study Guide: Exam XK0-005, Fifth Edition, will also earn a place in the libraries of people looking to change careers and start down an exciting new path in tech.

Enterprise Agility - A Practical Guide to Agile Business Management (Paperback): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Paperback)
Gizem Ozbayrac
R1,377 Discovery Miles 13 770 Ships in 9 - 15 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,451 Discovery Miles 24 510 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Managing in the Email Office (Paperback): Monica Seeley, Gerard Hargreaves Managing in the Email Office (Paperback)
Monica Seeley, Gerard Hargreaves
R684 Discovery Miles 6 840 Ships in 12 - 17 working days

Managing the Email Office is for all people who feel email is taking over their lives. It provides practical help and guidance on how to manage both their own volume of email as well as their organization's. It will enable you to develop winning ways with email and to re-claim some of those valuable resources which email consumes.The authors offer solutions to managing email that will help you save time and use email to communicate effectively and send the right message, right first time. These solutions are based on personal preferred patterns of work and management styles. The authors show you how to use email to support you and your team, to become more productive and reduce stress. Case histories are included throughout, to help you understand and apply the contents to you own and your organisation's situation. This book addresses: * how time management and personal effectiveness can be improved through better use of email. * how to develop and implement an email best practice policy for the organization. * how email can be used constructively to support customer relationship management and knowledge management

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R2,888 Discovery Miles 28 880 Ships in 12 - 17 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Misinformation Matters - Online Content and Quality Analysis (Hardcover): Uyiosa Omoregie, Kirsti Ryall Misinformation Matters - Online Content and Quality Analysis (Hardcover)
Uyiosa Omoregie, Kirsti Ryall
R4,194 Discovery Miles 41 940 Ships in 12 - 17 working days

The book is distinctive in its application of the early philosophy of Ludwig Wittgenstein to misinformation analysis. It also proposes a new theory of information quality. The book is timely as the issue of online information quality (especially on social media platforms) is now front-page news. The book proffers an alternative to the algorithmic engagement-based ranking of content by social media platforms: a new system for ranking online content based on information quality. The book also introduced two new concepts to the scholarly literature: “off-information” and “non-information”.

Secure, Resilient, and Agile Software Development (Paperback): Mark Merkow Secure, Resilient, and Agile Software Development (Paperback)
Mark Merkow
R1,330 Discovery Miles 13 300 Ships in 9 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

5G Cyber Risks and Mitigation (Hardcover): Sabhyata Soni 5G Cyber Risks and Mitigation (Hardcover)
Sabhyata Soni
R3,037 Discovery Miles 30 370 Ships in 12 - 17 working days

• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years

Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover): Govind P. Gupta,... Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover)
Govind P. Gupta, Rakesh Tripathi, Brij B. Gupta, Kwok Tai Chui
R3,038 Discovery Miles 30 380 Ships in 12 - 17 working days

Focuses on the latest development in Big IoT Data Analytics Presents different issues of Security and Privacy Analytics for Fog-enabled IoT system Offers the latest Big Data Technologies for security analytics in Fog-enabled IoT Network Discusses the emerging role of Big Data Analytics and Technologies in detection of Cyberattacks in IoT networks Presents the prospects on Big IoT Data Analytics in Fog-enabled IoT system

Cognitive Risk (Hardcover): James Bone, Jessie H Lee Cognitive Risk (Hardcover)
James Bone, Jessie H Lee
R3,041 Discovery Miles 30 410 Ships in 12 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Cyber Breach Response That Actually Works - Organizational Approach to Managing Residual Risk (Paperback): A Gorecki Cyber Breach Response That Actually Works - Organizational Approach to Managing Residual Risk (Paperback)
A Gorecki
R783 Discovery Miles 7 830 Ships in 12 - 17 working days

You will be breached--the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars--in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you'll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations. Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program Discover how incident response fits within your overall information security program, including a look at risk management Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in court In addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events.

Low-Power Computer Vision - Improve the Efficiency of Artificial Intelligence (Hardcover): George K. Thiruvathukal, Yung-Hsiang... Low-Power Computer Vision - Improve the Efficiency of Artificial Intelligence (Hardcover)
George K. Thiruvathukal, Yung-Hsiang Lu, Jaeyoun Kim, Yiran Chen, Bo Chen
R2,368 Discovery Miles 23 680 Ships in 9 - 15 working days

Energy efficiency is critical for running computer vision on battery-powered systems, such as mobile phones or UAVs (unmanned aerial vehicles, or drones). This book collects the methods that have won the annual IEEE Low-Power Computer Vision Challenges since 2015. The winners share their solutions and provide insight on how to improve the efficiency of machine learning systems.

Big Data Applications in Industry 4.0 (Hardcover): P Kaliraj, T. Devi Big Data Applications in Industry 4.0 (Hardcover)
P Kaliraj, T. Devi
R3,443 Discovery Miles 34 430 Ships in 9 - 15 working days

Industry 4.0 is the latest technological innovation in manufacturing with the goal to increase productivity in a flexible and efficient manner. Changing the way in which manufacturers operate, this revolutionary transformation is powered by various technology advances including Big Data analytics, Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. Big Data analytics has been identified as one of the significant components of Industry 4.0, as it provides valuable insights for smart factory management. Big Data and Industry 4.0 have the potential to reduce resource consumption and optimize processes, thereby playing a key role in achieving sustainable development. Big Data Applications in Industry 4.0 covers the recent advancements that have emerged in the field of Big Data and its applications. The book introduces the concepts and advanced tools and technologies for representing and processing Big Data. It also covers applications of Big Data in such domains as financial services, education, healthcare, biomedical research, logistics, and warehouse management. Researchers, students, scientists, engineers, and statisticians can turn to this book to learn about concepts, technologies, and applications that solve real-world problems. Features An introduction to data science and the types of data analytics methods accessible today An overview of data integration concepts, methodologies, and solutions A general framework of forecasting principles and applications, as well as basic forecasting models including naive, moving average, and exponential smoothing models A detailed roadmap of the Big Data evolution and its related technological transformation in computing, along with a brief description of related terminologies The application of Industry 4.0 and Big Data in the field of education The features, prospects, and significant role of Big Data in the banking industry, as well as various use cases of Big Data in banking, finance services, and insurance Implementing a Data Lake (DL) in the cloud and the significance of a data lake in decision making

Capturing Upside Risk - Finding and Managing Opportunities in Projects (Paperback): David Hillson Capturing Upside Risk - Finding and Managing Opportunities in Projects (Paperback)
David Hillson
R1,339 Discovery Miles 13 390 Ships in 9 - 15 working days

With more than three decades of experience as a thought-leader and expert practitioner, PMI Fellow Dr. David Hillson shares practical insight into how upside risks can be identified, assessed, and managed as opportunities. After reviewing the benefits of identifying opportunities, the book steps through the opportunity identification and management process in detail, describing proven tools and techniques as well as specific tips to make them work in practice. The book places opportunity management in the context of traditional risk management, providing a familiar pathway that leads project managers to discover new benefits and successes. David Hillson is one of the foremost authorities on risk management. With his latest book he presents a strong case for managing opportunities. As with all of David's books, the style of writing is engaging and easy to understand. There are many nuggets of wisdom in this book, as well as a hands-on approach to leveraging opportunity management as a way of improving project performance. - Cyndi Snyder Dionisio, PMI Fellow, Coronado CA, USA. (Chair of the PMBOK (R) Guide, Sixth Edition) I enjoyed reading this book, which is precise, clear, logical, and persuasive. The clarity of thought and expression explains why David is such a sought-after speaker. This book is a must-read for project risk practitioners, as well as for project professionals who are serious about addressing all the risks on their project, including the good ones. - Dr Dale Cooper, Cammeray NSW, Australia. (Director, Broadleaf Capital International) At last, a clear and valuable book linking both sides of the coin in risk management: threats and opportunities. David Hillson truly engages the reader on how to deal with these two types of risk in projects, sharing his wisdom and extensive experience in creating value from risk management. Anyone who has to manage risk in real-world projects should read this book to enhance their opportunity management skills. - Professor Salim Al-Harthi, Muscat, Oman. (Director of Risk Management Office, Sultan Qaboos University) It is vital for value creation in business and in life that we consider uncertainties that would have upside impacts on our objectives (opportunities), as well as downside impacts (threats). Business gets confused between opportunities where there is a binary choice to take or not, and true uncertain opportunities that can be seized, or left to chance. David has persevered in helping us understand this and this important book is a must-read for all leaders who want to create value through the proactive management of risk. - Dr Ruth Murray-Webster, Wakefield, UK. (Partner, Beyond the Deal LLP and Editor, APM Body of Knowledge, 7th Edition) As project managers, we always seem to focus on threats, negative risks. David Hillson, one of the foremost thought-leaders on risk management, explains approaches to identify and manage opportunities, positive risks and how this will help achieve project success. As with his previous books, David provides a structured approach with examples, tools, and techniques. An excellent resource for all project managers in today's world. - Peter Monkhouse, Toronto ON, Canada. (Past Chair PMI Board of Directors)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,368 Discovery Miles 13 680
The Gathering Cloud
J. R. Carpenter Paperback R378 Discovery Miles 3 780
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,097 R886 Discovery Miles 8 860
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
Data Visualization with Excel Dashboards…
D Kusleika Paperback R755 Discovery Miles 7 550
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,892 Discovery Miles 28 920
Kali Linux Penetration Testing Bible
G Khawaja Paperback R736 Discovery Miles 7 360
Transforming Your Business with AWS…
P Abdoulaye Paperback R715 Discovery Miles 7 150
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720

 

Partners