0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (858)
  • R500+ (13,713)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Shaping Future 6G Networks - Needs, Impacts and Technologies (Hardcover): E Bertin Shaping Future 6G Networks - Needs, Impacts and Technologies (Hardcover)
E Bertin
R3,160 Discovery Miles 31 600 Ships in 18 - 22 working days

Shaping Future 6G Networks Discover the societal and technology drivers contributing to build the next generation of wireless telecommunication networks Shaping Future 6G Networks: Needs, Impacts, and Technologies is a holistic snapshot on the evolution of 5G technologies towards 6G. With contributions from international key players in industry and academia, the book presents the hype versus the realistic capabilities of 6G technologies, and delivers cutting-edge business and technological insights into the future wireless telecommunications landscape. You'll learn about: Forthcoming demand for post 5G networks, including new requirements coming from small and large businesses, manufacturing, logistics, and automotive industry Societal implications of 6G, including digital sustainability, strategies for increasing energy efficiency, as well as future open networking ecosystems Impacts of integrating non-terrestrial networks to build the 6G architecture Opportunities for emerging THz radio access technologies in future integrated communications, positioning, and sensing capabilities in 6G Design of highly modular and distributed 6G core networks driven by the ongoing RAN-Core integration and the benefits of AI/ML-based control and management Disruptive architectural considerations influenced by the Post-Shannon Theory The insights in Shaping Future 6G Networks will greatly benefit IT engineers and managers focused on the future of networking, as well as undergraduate and graduate engineering students focusing on the design, implementation, and management of mobile networks and applications.

Cyber Security (Hardcover): Yu Zhou, Jia Li, Li Ding Cyber Security (Hardcover)
Yu Zhou, Jia Li, Li Ding
R1,297 Discovery Miles 12 970 Ships in 18 - 22 working days
Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback): Florian Skopik, Paul Dr. Smith Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback)
Florian Skopik, Paul Dr. Smith
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Next Generation Wireless Network Security and Privacy (Hardcover): Kamaljit I Lakhtaria Next Generation Wireless Network Security and Privacy (Hardcover)
Kamaljit I Lakhtaria
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Ecological Design of Smart Home Networks - Technologies, Social Impact and Sustainability (Hardcover): N. Saito, D Menga Ecological Design of Smart Home Networks - Technologies, Social Impact and Sustainability (Hardcover)
N. Saito, D Menga
R5,402 R4,998 Discovery Miles 49 980 Save R404 (7%) Ships in 10 - 15 working days

This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation. Part One outlines the key principles and technologies needed for ecological smart home networks. Beginning with a thorough overview of the concept behind ecological smart home network design, the book reviews such important areas as power line communications, hybrid systems and middleware platforms. Part Two then goes on to discuss some important applications of this technology, with wireless smart sensor networks for home and telecare, and smart home networking for content and energy management (including the intelligent Zero Emission Urban System), all explored in detail.

Computational Network Science - An Algorithmic Approach (Paperback): Henry Hexmoor Computational Network Science - An Algorithmic Approach (Paperback)
Henry Hexmoor
R783 Discovery Miles 7 830 Ships in 10 - 15 working days

The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatible datasets, which has kept it from being a truly universal discipline. Computational Network Science seeks to unify the methods used to analyze these diverse fields. This book provides an introduction to the field of Network Science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way. This new approach would remove the need for tedious human-based analysis of different datasets and help researchers spend more time on the qualitative aspects of network science research.

Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover): Veljko Milutinovic, Milos Kotlar Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover)
Veljko Milutinovic, Milos Kotlar
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing.

Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover)
Information R Management Association
R13,746 Discovery Miles 137 460 Ships in 18 - 22 working days
Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,163 Discovery Miles 61 630 Ships in 18 - 22 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,076 Discovery Miles 30 760 Ships in 18 - 22 working days
Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Vehicular Communications and Networks - Architectures, Protocols, Operation and Deployment (Hardcover): W. Chen Vehicular Communications and Networks - Architectures, Protocols, Operation and Deployment (Hardcover)
W. Chen
R4,921 Discovery Miles 49 210 Ships in 10 - 15 working days

Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment discusses VANETs (Vehicular Ad-hoc Networks) or VCS (Vehicular Communication Systems), which can improve safety, decrease fuel consumption, and increase the capacity of existing roadways and which is critical for the Intelligent Transportation System (ITS) industry. Part one covers architectures for VCS, part two describes the physical layer, antenna technologies and propagation models, part three explores protocols, algorithms, routing and information dissemination, and part four looks at the operation and deployment of vehicular communications and networks.

Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
Amazon EC2 Auto Scaling User Guide (Hardcover): Documentation Team Amazon EC2 Auto Scaling User Guide (Hardcover)
Documentation Team
R1,162 Discovery Miles 11 620 Ships in 18 - 22 working days
Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R13,766 Discovery Miles 137 660 Ships in 18 - 22 working days
Safety and Security Issues in Technical Infrastructures (Hardcover): David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada Safety and Security Issues in Technical Infrastructures (Hardcover)
David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada
R5,490 Discovery Miles 54 900 Ships in 18 - 22 working days

In the modern age of urbanisation, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernisation of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,090 Discovery Miles 90 900 Ships in 18 - 22 working days
Introduction to US Cybersecurity Careers (Paperback): Henry Dalziel Introduction to US Cybersecurity Careers (Paperback)
Henry Dalziel
R838 Discovery Miles 8 380 Ships in 10 - 15 working days

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback): Henry Dalziel How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback)
Henry Dalziel; Edited by Simon Crosby
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

Deep Learning AMI Developer Guide (Hardcover): Documentation Team Deep Learning AMI Developer Guide (Hardcover)
Documentation Team
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days
Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,327 Discovery Miles 103 270 Ships in 18 - 22 working days
TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R826 Discovery Miles 8 260 Ships in 10 - 15 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

HCISPP Study Guide (Paperback): Timothy Virtue, Justin Rainey HCISPP Study Guide (Paperback)
Timothy Virtue, Justin Rainey
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC(2). The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.

Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520

 

Partners