0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (341)
  • R250 - R500 (929)
  • R500+ (16,268)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Capturing Upside Risk - Finding and Managing Opportunities in Projects (Paperback): David Hillson Capturing Upside Risk - Finding and Managing Opportunities in Projects (Paperback)
David Hillson
R1,339 Discovery Miles 13 390 Ships in 9 - 15 working days

With more than three decades of experience as a thought-leader and expert practitioner, PMI Fellow Dr. David Hillson shares practical insight into how upside risks can be identified, assessed, and managed as opportunities. After reviewing the benefits of identifying opportunities, the book steps through the opportunity identification and management process in detail, describing proven tools and techniques as well as specific tips to make them work in practice. The book places opportunity management in the context of traditional risk management, providing a familiar pathway that leads project managers to discover new benefits and successes. David Hillson is one of the foremost authorities on risk management. With his latest book he presents a strong case for managing opportunities. As with all of David's books, the style of writing is engaging and easy to understand. There are many nuggets of wisdom in this book, as well as a hands-on approach to leveraging opportunity management as a way of improving project performance. - Cyndi Snyder Dionisio, PMI Fellow, Coronado CA, USA. (Chair of the PMBOK (R) Guide, Sixth Edition) I enjoyed reading this book, which is precise, clear, logical, and persuasive. The clarity of thought and expression explains why David is such a sought-after speaker. This book is a must-read for project risk practitioners, as well as for project professionals who are serious about addressing all the risks on their project, including the good ones. - Dr Dale Cooper, Cammeray NSW, Australia. (Director, Broadleaf Capital International) At last, a clear and valuable book linking both sides of the coin in risk management: threats and opportunities. David Hillson truly engages the reader on how to deal with these two types of risk in projects, sharing his wisdom and extensive experience in creating value from risk management. Anyone who has to manage risk in real-world projects should read this book to enhance their opportunity management skills. - Professor Salim Al-Harthi, Muscat, Oman. (Director of Risk Management Office, Sultan Qaboos University) It is vital for value creation in business and in life that we consider uncertainties that would have upside impacts on our objectives (opportunities), as well as downside impacts (threats). Business gets confused between opportunities where there is a binary choice to take or not, and true uncertain opportunities that can be seized, or left to chance. David has persevered in helping us understand this and this important book is a must-read for all leaders who want to create value through the proactive management of risk. - Dr Ruth Murray-Webster, Wakefield, UK. (Partner, Beyond the Deal LLP and Editor, APM Body of Knowledge, 7th Edition) As project managers, we always seem to focus on threats, negative risks. David Hillson, one of the foremost thought-leaders on risk management, explains approaches to identify and manage opportunities, positive risks and how this will help achieve project success. As with his previous books, David provides a structured approach with examples, tools, and techniques. An excellent resource for all project managers in today's world. - Peter Monkhouse, Toronto ON, Canada. (Past Chair PMI Board of Directors)

Applications of 5G and Beyond in Smart Cities (Hardcover): Ambar Bajpai, Arun Balodi Applications of 5G and Beyond in Smart Cities (Hardcover)
Ambar Bajpai, Arun Balodi
R3,166 Discovery Miles 31 660 Ships in 12 - 17 working days

Gives broad perspective on 5G communications with a focus on smart cities Discusses artificial intelligence in future wireless communication and its applications Provides a systemic and comprehensive coverage of 6G technologies, challenges and use cases Explores role of future wireless in safety, health, and transport in smart cities Includes case studies of future wireless communications

The Complete Guide for CISA Examination Preparation (Paperback): Richard E. Cascarino The Complete Guide for CISA Examination Preparation (Paperback)
Richard E. Cascarino
R1,163 Discovery Miles 11 630 Ships in 9 - 15 working days

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years' experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.

Cybersecurity Analytics (Paperback): Rakesh M. Verma, David J Marchette Cybersecurity Analytics (Paperback)
Rakesh M. Verma, David J Marchette
R1,405 Discovery Miles 14 050 Ships in 9 - 15 working days

Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just interested in finding patterns in your datasets? This book can let you do it on your own. Numerous examples and datasets links are included so that the reader can "learn by doing." Anyone with a basic college-level calculus course and some probability knowledge can easily understand most of the material. The book includes chapters containing: unsupervised learning, semi-supervised learning, supervised learning, text mining, natural language processing, and more. It also includes background on security, statistics, and linear algebra. The website for the book contains a listing of datasets, updates, and other resources for serious practitioners.

Building an Information Security Awareness Program (Paperback): Mark B. Desman Building an Information Security Awareness Program (Paperback)
Mark B. Desman
R2,885 Discovery Miles 28 850 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.
Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback): IT Governance The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback)
IT Governance
R1,367 Discovery Miles 13 670 Ships in 12 - 17 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Paperback): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Paperback)
Douglas J Landoll
R959 Discovery Miles 9 590 Ships in 9 - 15 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

(ISC)2 SSCP Systems Security Certified Practitione r Official Study Guide, 3rd Edition (Paperback, 3rd Edition): M. Wills (ISC)2 SSCP Systems Security Certified Practitione r Official Study Guide, 3rd Edition (Paperback, 3rd Edition)
M. Wills
R1,099 Discovery Miles 10 990 Ships in 12 - 17 working days

The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. This comprehensive Official Study Guide--the only study guide officially approved by (ISC)2--covers all objectives of the seven SSCP domains. Security Operations and Administration Access Controls Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security This updated Third Edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.

Implementing Service Level Objectives - A Practical Guide to SLIs, SLOs, and Error Budgets (Paperback): Alex Hidalgo Implementing Service Level Objectives - A Practical Guide to SLIs, SLOs, and Error Budgets (Paperback)
Alex Hidalgo
R1,266 R1,111 Discovery Miles 11 110 Save R155 (12%) Ships in 12 - 17 working days

Although service-level objectives (SLOs) continue to grow in importance, there's a distinct lack of information about how to implement them. Practical advice that does exist usually assumes that your team already has the infrastructure, tooling, and culture in place. In this book, recognized SLO expert Alex Hidalgo explains how to build an SLO culture from the ground up. Ideal as a primer and daily reference for anyone creating both the culture and tooling necessary for SLO-based approaches to reliability, this guide provides detailed analysis of advanced SLO and service-level indicator (SLI) techniques. Armed with mathematical models and statistical knowledge to help you get the most out of an SLO-based approach, you'll learn how to build systems capable of measuring meaningful SLIs with buy-in across all departments of your organization. Define SLIs that meaningfully measure the reliability of a service from a user's perspective Choose appropriate SLO targets, including how to perform statistical and probabilistic analysis Use error budgets to help your team have better discussions and make better data-driven decisions Build supportive tooling and resources required for an SLO-based approach Use SLO data to present meaningful reports to leadership and your users

Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Paperback): Akira... Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Paperback)
Akira Summers
R1,505 Discovery Miles 15 050 Ships in 9 - 15 working days

Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,030 Discovery Miles 30 300 Ships in 12 - 17 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

AI Factory - Theories, Applications and Case Studies (Hardcover): Ramin Karim, Diego Galar, Uday Kumar AI Factory - Theories, Applications and Case Studies (Hardcover)
Ramin Karim, Diego Galar, Uday Kumar
R4,662 Discovery Miles 46 620 Ships in 12 - 17 working days

This book provides insights on how to approach and utilize data science tools, technologies and methodologies related to artificial intelligence (AI) in industrial contexts. It explains the essence of distributed computing and AI-technologies, and their inter-connections. Description of various technology and methodology approaches, and their purpose and benefits when developing AI-solution in industrial contexts is included. In addition, it summarizes experiences from AI technology deployment projects from several industrial sectors. Features: Presents compendium of methodologies and technologies in Industrial AI and digitalization. Illustrates sensor to actuation approach showing complete cycle, that defines and differences AI and digitalization concept. Covers a broad range of academic and industrial issues within the field of asset management. Discusses impact of Industry 4.0 in other sectors. Includes a dedicated chapter on real-time case studies. This book is aimed at researchers and professionals in industrial and software engineering, network security, AI and ML, engineering managers, operational and maintenance specialists, asset managers, digital and AI manufacturing specialists.

The Cloud Computing Book - The Future of Computing Explained (Hardcover): Douglas Comer The Cloud Computing Book - The Future of Computing Explained (Hardcover)
Douglas Comer
R3,506 Discovery Miles 35 060 Ships in 9 - 15 working days

This latest textbook from bestselling author, Douglas E. Comer, is a class-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles, rather than commercial offerings by cloud providers and vendors, The Cloud Computing Book: The Future of Computing Explained gives readers a complete picture of the advantages and growth of cloud computing, cloud infrastructure, virtualization, automation and orchestration, and cloud-native software design. The book explains real and virtual data center facilities, including computation (e.g., servers, hypervisors, Virtual Machines, and containers), networks (e.g., leaf-spine architecture, VLANs, and VxLAN), and storage mechanisms (e.g., SAN, NAS, and object storage). Chapters on automation and orchestration cover the conceptual organization of systems that automate software deployment and scaling. Chapters on cloud-native software cover parallelism, microservices, MapReduce, controller-based designs, and serverless computing. Although it focuses on concepts and principles, the book uses popular technologies in examples, including Docker containers and Kubernetes. Final chapters explain security in a cloud environment and the use of models to help control the complexity involved in designing software for the cloud. The text is suitable for a one-semester course for software engineers who want to understand cloud, and for IT managers moving an organization's computing to the cloud.

Future Health Scenarios - AI and Digital Technologies in Global Healthcare Systems (Hardcover): Maria José Sousa, Francisco... Future Health Scenarios - AI and Digital Technologies in Global Healthcare Systems (Hardcover)
Maria José Sousa, Francisco Guilherme Nunes, Generosa do Nascimento, Chinmay Chakraborty
R3,174 Discovery Miles 31 740 Ships in 12 - 17 working days

Focusses on prospective scenarios in health to foresight possible futures Addresses the urgent needs of the key population, socio-technical, and health themes Covers health innovative practices as 3D models for surgeries, big data to treat rare diseases, AI robot for heart treatments Explores telemedicine using big data, deep learning, robotics, mobile and remote applications Reviews public health based on predictive analytics and disease trends

Cybercrime Investigations - A Comprehensive Resource for Everyone (Hardcover): John Bandler, Antonia Merzon Cybercrime Investigations - A Comprehensive Resource for Everyone (Hardcover)
John Bandler, Antonia Merzon
R3,429 Discovery Miles 34 290 Ships in 9 - 15 working days

Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.

Cloud Security - Attacks, Techniques, Tools, and Challenges (Hardcover): Preeti Mishra, Emmanuel S. Pilli, R.C. Joshi Cloud Security - Attacks, Techniques, Tools, and Challenges (Hardcover)
Preeti Mishra, Emmanuel S. Pilli, R.C. Joshi
R3,845 Discovery Miles 38 450 Ships in 9 - 15 working days

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis - case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI - case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.

Microsoft Azure Monitoring & Management - The Definitive Guide (Paperback): Avinash Valiramani Microsoft Azure Monitoring & Management - The Definitive Guide (Paperback)
Avinash Valiramani
R785 Discovery Miles 7 850 Ships in 12 - 17 working days

Proven best practices for success with every Azure monitoring and management service For cloud environments to deliver optimal value, their monitoring and management services must be designed, deployed, and managed well. Leading cloud consultant Avinash Valiramani shows how to simplify administration, reduce downtime, control cost, solve problems faster, and prepare for any workload in any environment. Explore detailed, expert coverage of Azure Backup, Azure Site Recovery, Azure Migrate, Azure Monitor, Azure Network Watcher, Azure Portal, Azure Cloud Shell, Azure Service Health, Azure Cost Management, and more. Whatever your role in delivering effi cient, reliable cloud services, this best practice, deep dive guide will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Back up on-premises, Azure-based, and other cloud workloads for short- and long-term retention Implement simple, stable, cost-effective business continuity/disaster recovery with Azure Site Recovery Discover, assess, and migrate diverse workloads to Azure, VMs, web apps, databases, and more Monitor all Azure applications, VMs, and other deployed services centrally via Azure Monitor Track, troubleshoot, and optimize networking for IaaS resources Create and manage anything from single-service solutions to complex multi-service architectures Run Azure Cloud Shell's cloud-native command line from any device, anywhere Monitor service health, workload levels, service layer resources, and availability Also look for these Definitive Guides to Azure success: Microsoft Azure Compute: The Definitive Guide Microsoft Azure Networking: The Definitive Guide Microsoft Azure Storage: The Definitive Guide

Terraform - Up and Running - Writing Infrastructure as Code (Paperback, 3rd edition): Yevgeniy Brikman Terraform - Up and Running - Writing Infrastructure as Code (Paperback, 3rd edition)
Yevgeniy Brikman
R1,277 R1,122 Discovery Miles 11 220 Save R155 (12%) Ships in 12 - 17 working days

Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more. This hands-on third edition, expanded and thoroughly updated for version 1.0 and beyond, shows you the fastest way to get up and running with Terraform. Gruntwork cofounder Yevgeniy (Jim) Brikman walks you through code examples that demonstrate Terraform's simple, declarative programming language for deploying and managing infrastructure with a few commands. Veteran sysadmins, DevOps engineers, and novice developers will quickly go from Terraform basics to running a full stack that can support a massive amount of traffic and a large team of developers. Compare Terraform with Chef, Puppet, Ansible, CloudFormation, Docker, and Packer Deploy servers, load balancers, and databases Create reusable infrastructure with Terraform modules Test your Terraform modules with static analysis, unit tests, and integration tests Configure CI/CD pipelines for both your apps and infrastructure code Use advanced Terraform syntax for loops, conditionals, and zero-downtime deployment New to the third edition: Get up to speed on Terraform 0.13 to 1.0 and beyond Manage secrets (passwords, API keys) with Terraform Work with multiple clouds and providers (including Kubernetes!)

Research Advances in Network Technologies (Hardcover): Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg Research Advances in Network Technologies (Hardcover)
Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg
R3,029 Discovery Miles 30 290 Ships in 12 - 17 working days

1. The book will discuss most relevant real-life applications and case studies of Network Technologies. 2. The book will provide deeper knowledge regarding emerging research trends and future research directions in Network Technologies. 3. The book will provide theoretical, algorithmic, simulation, and implementation-based research developments in Network Technologies. 4. The book will follow theoretical approach to describe fundamentals of Network Technologies for the beginners as well as practical approach to depict simulation and implementation of real-life applications for intermediate and advanced readers.

Cloud Computing in Medical Imaging (Hardcover): Ayman El-Baz, Jasjit S. Suri Cloud Computing in Medical Imaging (Hardcover)
Ayman El-Baz, Jasjit S. Suri
R4,198 Discovery Miles 41 980 Ships in 12 - 17 working days

Today's healthcare organizations must focus on a lot more than just the health of their clients. The infrastructure it takes to support clinical-care delivery continues to expand, with information technology being one of the most significant contributors to that growth. As companies have become more dependent on technology for their clinical, administrative, and financial functions, their IT departments and expenditures have had to scale quickly to keep up. However, as technology demands have increased, so have the options for reliable infrastructure for IT applications and data storage. The one that has taken center stage over the past few years is cloud computing. Healthcare researchers are moving their efforts to the cloud because they need adequate resources to process, store, exchange, and use large quantities of medical data. Cloud Computing in Medical Imaging covers the state-of-the-art techniques for cloud computing in medical imaging, healthcare technologies, and services. The book focuses on Machine-learning algorithms for health data security Fog computing in IoT-based health care Medical imaging and healthcare applications using fog IoT networks Diagnostic imaging and associated services Image steganography for medical informatics This book aims to help advance scientific research within the broad field of cloud computing in medical imaging, healthcare technologies, and services. It focuses on major trends and challenges in this area and presents work aimed to identify new techniques and their use in biomedical analysis.

Cyberdemocracy - Technology, Cities and Civic Networks (Hardcover): Cathy Bryan, Damian Tambini, Roza Tsagarousianou Cyberdemocracy - Technology, Cities and Civic Networks (Hardcover)
Cathy Bryan, Damian Tambini, Roza Tsagarousianou
R4,206 Discovery Miles 42 060 Ships in 12 - 17 working days

Is information technology enhancing democracy? Developments in information technology and the Internet are taking place at an almost bewildering pace. Such improvements, however, are believed to present opportunities for improving the responsiveness and accountability of political institutions and enhancing citizen participation. In this text the theoretical arguments for and against "electronic democracy" and the potential of information and communication technology are closely examined. The book is underpinned by a series of case studies in the US and Europe that demonstrate the application of "electronic democracy" in a number of city and civic projects. The book aims to provide a balanced and considered evaluation of the potential for "electronic democracy" based on empirical research.

Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Paperback): Rajesh Jugulum Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Paperback)
Rajesh Jugulum
R822 Discovery Miles 8 220 Ships in 9 - 15 working days

Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.

Cybersecurity for Information Professionals - Concepts and Applications (Paperback): Hsia-Ching Chang, Suliman Hawamdeh Cybersecurity for Information Professionals - Concepts and Applications (Paperback)
Hsia-Ching Chang, Suliman Hawamdeh
R1,308 Discovery Miles 13 080 Ships in 9 - 15 working days

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.

Web-Weaving - Intranets, Extranets and Strategic Alliances (Paperback): Paula Boyle, Peter Lloyd Web-Weaving - Intranets, Extranets and Strategic Alliances (Paperback)
Paula Boyle, Peter Lloyd
R1,440 R942 Discovery Miles 9 420 Save R498 (35%) Ships in 12 - 17 working days

Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and Organizational Development using contributions from innovative thinkers and practitioners in both areas. The first section defines what web-weaving actual is, describing the huge range of communication technology available to organizations at the moment. The second section reviews web-weaving in practice using case studies of companies using intranet and extranet technology. The third section brings together commentaries from leading players in both the IT and Human Resources fields to predict the future of web-weaving and the huge impact it will have on the way organizations and the people within them will work together in the future.

Visualizing Google Cloud - 101 Illustrated References for Cloud Engineers and Architects (Paperback): Priyanka Vergadia Visualizing Google Cloud - 101 Illustrated References for Cloud Engineers and Architects (Paperback)
Priyanka Vergadia
R676 Discovery Miles 6 760 Ships in 12 - 17 working days

Easy-to-follow visual walkthrough of every important part of the Google Cloud Platform The Google Cloud Platform incorporates dozens of specialized services that enable organizations to offload technological needs onto the cloud. From routine IT operations like storage to sophisticated new capabilities including artificial intelligence and machine learning, the Google Cloud Platform offers enterprises the opportunity to scale and grow efficiently. In Visualizing Google Cloud: Illustrated References for Cloud Engineers & Architects, Google Cloud expert Priyanka Vergadia delivers a fully illustrated, visual guide to matching the best Google Cloud Platform services to your own unique use cases. After a brief introduction to the major categories of cloud services offered by Google, the author offers approximately 100 solutions divided into eight categories of services included in Google Cloud Platform: Compute Storage Databases Data Analytics Data Science, Machine Learning and Artificial Intelligence Application Development and Modernization with Containers Networking Security You'll find richly illustrated flowcharts and decision diagrams with straightforward explanations in each category, making it easy to adopt and adapt Google's cloud services to your use cases. With coverage of the major categories of cloud models--including infrastructure-, containers-, platforms-, functions-, and serverless--and discussions of storage types, databases and Machine Learning choices, Visualizing Google Cloud: Illustrated References for Cloud Engineers & Architects is perfect for every Google Cloud enthusiast, of course. It is for anyone who is planning a cloud migration or new cloud deployment. It is for anyone preparing for cloud certification, and for anyone looking to make the most of Google Cloud. It is for cloud solutions architects, IT decision-makers, and cloud data and ML engineers. In short, this book is for YOU.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,337 R1,199 Discovery Miles 11 990
CISA - Certified Information Systems…
Cannon Paperback R1,653 R1,274 Discovery Miles 12 740
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
CEH v12 Certified Ethical Hacker Study…
Ric Messier Paperback R1,327 Discovery Miles 13 270
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,493 R1,199 Discovery Miles 11 990
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R236 Discovery Miles 2 360
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,097 R886 Discovery Miles 8 860
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,892 Discovery Miles 28 920
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R622 Discovery Miles 6 220

 

Partners