0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (362)
  • R250 - R500 (937)
  • R500+ (14,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover): Dewayne Hart The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover)
Dewayne Hart
R720 Discovery Miles 7 200 Ships in 12 - 17 working days
Edge Networking - Internet of Edges (Hardcover): K Agha Edge Networking - Internet of Edges (Hardcover)
K Agha
R3,613 Discovery Miles 36 130 Ships in 12 - 17 working days

The Internet of Edges is a new paradigm whose objective is to keep data and processing close to the user. This book presents three different levels of Edge networking: MEC (Multi-access Edge Computing), Fog and Far Edge (sometimes called Mist or Skin). It also reviews participatory networks, in which user equipment provides the resources for the Edge network. Edge networks can be disconnected from the core Internet, and the interconnection of autonomous edge networks can then form the Internet of Edges. This book analyzes the characteristics of Edge networks in detail, showing their capacity to replace the imposing Clouds of core networks due to their superior server response time, data security and energy saving.

Advances in Malware and Data-Driven Network Security (Hardcover): Brij B. Gupta Advances in Malware and Data-Driven Network Security (Hardcover)
Brij B. Gupta
R5,616 Discovery Miles 56 160 Ships in 12 - 17 working days

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover): Mohit Dua, Ankit Kumar Jain Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover)
Mohit Dua, Ankit Kumar Jain
R8,415 Discovery Miles 84 150 Ships in 10 - 15 working days

The artificial intelligence subset machine learning has become a popular technique in professional fields as many are finding new ways to apply this trending technology into their everyday practices. Two fields that have majorly benefited from this are pattern recognition and information security. The ability of these intelligent algorithms to learn complex patterns from data and attain new performance techniques has created a wide variety of uses and applications within the data security industry. There is a need for research on the specific uses machine learning methods have within these fields, along with future perspectives. Machine Learning Techniques for Pattern Recognition and Information Security is a collection of innovative research on the current impact of machine learning methods within data security as well as its various applications and newfound challenges. While highlighting topics including anomaly detection systems, biometrics, and intrusion management, this book is ideally designed for industrial experts, researchers, IT professionals, network developers, policymakers, computer scientists, educators, and students seeking current research on implementing machine learning tactics to enhance the performance of information security.

Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles (Hardcover): Jordi Guijarro, Saber Mhiri,... Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles (Hardcover)
Jordi Guijarro, Saber Mhiri, You-Jun Choi
R2,779 Discovery Miles 27 790 Ships in 10 - 15 working days

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors' firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.

Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,692 Discovery Miles 76 920 Ships in 12 - 17 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Jumpstart Your Career in Data Centers (Color Edition) - Featuring Careers for Women, Trades, and Vets in Tech and Data Centers... Jumpstart Your Career in Data Centers (Color Edition) - Featuring Careers for Women, Trades, and Vets in Tech and Data Centers (Hardcover)
Carrie Goetz
R1,143 R922 Discovery Miles 9 220 Save R221 (19%) Ships in 10 - 15 working days
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4 (Hardcover)
Information R Management Association
R13,372 Discovery Miles 133 720 Ships in 10 - 15 working days
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 3... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 3 (Hardcover)
Information R Management Association
R13,368 Discovery Miles 133 680 Ships in 10 - 15 working days
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 2... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 2 (Hardcover)
Information R Management Association
R13,378 Discovery Miles 133 780 Ships in 10 - 15 working days
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 1... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 1 (Hardcover)
Information R Management Association
R13,357 Discovery Miles 133 570 Ships in 10 - 15 working days
Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover): Ricardo Queiros, Bruno Cunha,... Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover)
Ricardo Queiros, Bruno Cunha, Xavier Fonseca
R11,190 Discovery Miles 111 900 Ships in 10 - 15 working days

Digital technologies are currently dramatically changing healthcare. Cloud healthcare is an increasingly trending topic in the field, converging skills from computer and health science. This new strategy fosters the management of health data at a large scale and makes it easier for healthcare organizations to improve patient experience and health team productivity while helping the support, security, compliance, and interoperability of health data. Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare is a reference in the ongoing digital transformation of the healthcare sector. It presents a comprehensive state-of-the-art approach to cloud internet of things health technologies and practices. It provides insights over strategies, methodologies, techniques, tools, and services based on emerging cloud digital health solutions to overcome digital health challenges. Covering topics such as auxiliary systems, the internet of medical things, and natural language processing, this premier reference source is an essential resource for medical professionals, hospital administrators, medical students, medical professors, libraries, researchers, and academicians.

Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover): Ashwani Kumar, Seelam Sai Satyanarayana... Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover)
Ashwani Kumar, Seelam Sai Satyanarayana Reddy
R6,253 Discovery Miles 62 530 Ships in 12 - 17 working days

The use of digital images in today's modernized market is rapidly increasing throughout organizations due to the prevalence of social media and digital content. Companies who wish to distribute their content over the internet face numerous security risks such as copyright violation. Advanced methods for the protection and security of digital data are constantly emerging, and up-to-date research in this area is lacking. Advancements in Security and Privacy Initiatives for Multimedia Images is a collection of innovative research on the methods and applications of contemporary techniques for the security and copyright protection of images and their distribution. While highlighting topics including simulation-based security, digital watermarking protocols, and counterfeit prevention, this book is ideally designed for security analysts, researchers, developers, programmers, academicians, practitioners, students, executives, educators, and policymakers seeking current research on modern security improvements for multimedia images.

Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations (Hardcover): Ana Pego Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations (Hardcover)
Ana Pego
R8,162 Discovery Miles 81 620 Ships in 10 - 15 working days

Businesses have had to face many challenges due to the COVID-19 pandemic; to survive in the changing landscape, they had to adapt quickly and implement new tactics and best practices to stay competitive. Networking is one of the many areas that looks vastly different in a post-pandemic world and companies must understand this change or risk falling behind. Further study is required to uncover the various difficulties and potential future directions of networking and innovation within the business landscape. The Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations provides a thorough overview of the ways in which organizations have had to change and adapt to the new business environments and considers how networking looks different in a post-COVID-19 world. Covering key topics such as organizational structures, consumer behavior, teleworking, and collaborations, this major reference work is ideal for managers, business owners, industry professionals, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover): Pradeep Tomar Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover)
Pradeep Tomar
R7,022 Discovery Miles 70 220 Ships in 10 - 15 working days

The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based IoT systems. Integration and Implementation of the Internet of Things Through Cloud Computing studies, analyzes, and presents cloud-based IoT-related technologies, protocols, and standards along with recent research and development in cloud-based IoT. It also presents recent emerging trends and technological advances of cloud-based IoT, innovative applications, and the challenges and implications for society. The chapters included take a strong look at the societal and social aspects of this technology along with its implementations and technological analyses. This book is intended for IT specialists, technologists, practitioners, researchers, academicians, and students who are interested in the next era of IoT through cloud computing.

Model-Driven Development and Operation of Multi-Cloud Applications - The MODAClouds Approach (Hardcover): Dana Petcu, Peter... Model-Driven Development and Operation of Multi-Cloud Applications - The MODAClouds Approach (Hardcover)
Dana Petcu, Peter Matthews, Elisabetta Di Nitto
R1,339 Discovery Miles 13 390 Ships in 10 - 15 working days
Managing Resources for Futuristic Wireless Networks (Hardcover): Tariq Umer Managing Resources for Futuristic Wireless Networks (Hardcover)
Tariq Umer
R5,613 Discovery Miles 56 130 Ships in 12 - 17 working days

The key parameter that needs to be considered when planning the management of resources in futuristic wireless networks is a balanced approach to resource distribution. A balanced approach is necessary to provide an unbiased working environment for the distribution, sharing, allocation, and supply of resources among the devices of the wireless network. Equal resource distribution also maintains balance and stability between the operations of communication systems and thus improves the performance of wireless networks. Managing Resources for Futuristic Wireless Networks is a pivotal reference source that presents research related to the control and management of key parameters of bandwidth, spectrum sensing, channel selection, resource sharing, and task scheduling, which is necessary to ensure the efficient operation of wireless networks. Featuring topics that include vehicular ad-hoc networks, resource management, and the internet of things, this publication is ideal for professionals and researchers working in the field of networking, information and knowledge management, and communication sciences. Moreover, the book will provide insights and support executives concerned with the management of expertise, knowledge, information, and organizational development in different types of work communities and environments.

Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017): Richard Jiang,... Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017)
Richard Jiang, Somaya Al-Maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi
R5,061 R4,807 Discovery Miles 48 070 Save R254 (5%) Ships in 12 - 17 working days

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and... Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and Updated ed.)
Ian Lamont
R550 Discovery Miles 5 500 Ships in 12 - 17 working days
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (Hardcover): Ryma Abassi, Aida Ben Chehida Douss Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (Hardcover)
Ryma Abassi, Aida Ben Chehida Douss
R6,256 Discovery Miles 62 560 Ships in 12 - 17 working days

The COVID-19 pandemic has forced organizations and individuals to embrace new practices such as social distancing and remote working. During these unprecedented times, many have increasingly relied on the internet for work, shopping, and healthcare. However, while the world focuses on the health and economic threats posed by the COVID-19 pandemic, cyber criminals are capitalizing on this crisis as the world has become more digitally dependent and vulnerable than ever. Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic provides cutting-edge research on the best guidelines for preventing, detecting, and responding to cyber threats within educational, business, health, and governmental organizations during the COVID-19 pandemic. It further highlights the importance of focusing on cybersecurity within organizational crisis management. Covering topics such as privacy and healthcare, remote work, and personal health data, this premier reference source is an indispensable resource for startup companies, health and business executives, ICT procurement managers, IT professionals, libraries, students and educators of higher education, entrepreneurs, government officials, social media experts, researchers, and academicians.

Cybersecurity 2021 (Hardcover): Carl Freeman Cybersecurity 2021 (Hardcover)
Carl Freeman
R1,128 R907 Discovery Miles 9 070 Save R221 (20%) Ships in 10 - 15 working days
Handbook of Research on Advancing Cybersecurity for Digital Transformation (Hardcover): Kamaljeet Sandhu Handbook of Research on Advancing Cybersecurity for Digital Transformation (Hardcover)
Kamaljeet Sandhu
R7,909 Discovery Miles 79 090 Ships in 10 - 15 working days

Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, and many times invisible cyber attackers are never traced or can never be found. Cyberattacks can only be known once the attack and the destruction have already taken place long after the attackers have left. Cybersecurity for computer systems has increasingly become important because the government, military, corporate, financial, critical infrastructure, and medical organizations rely heavily on digital network systems, which process and store large volumes of data on computer devices that are exchanged on the internet, and they are vulnerable to ""continuous"" cyberattacks. As cybersecurity has become a global concern, it needs to be clearly understood, and innovative solutions are required. Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges looks deeper into issues, problems, and innovative solutions and strategies that are linked to cybersecurity. This book will provide important knowledge that can impact the improvement of cybersecurity, which can add value in terms of innovation to solving cybersecurity threats. The chapters cover cybersecurity challenges, technologies, and solutions in the context of different industries and different types of threats. This book is ideal for cybersecurity researchers, professionals, scientists, scholars, and managers, as well as practitioners, stakeholders, researchers, academicians, and students interested in the latest advancements in cybersecurity for digital transformation.

CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition): M. Chapple CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition)
M. Chapple
R1,042 R856 Discovery Miles 8 560 Save R186 (18%) Ships in 10 - 15 working days

Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601. Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Perfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.

Wearable Devices - the Big Wave of Innovation (Hardcover): Noushin Nasiri Wearable Devices - the Big Wave of Innovation (Hardcover)
Noushin Nasiri
R3,452 R3,224 Discovery Miles 32 240 Save R228 (7%) Ships in 10 - 15 working days
Statistical Analysis of Networks (Hardcover): Konstantin Avrachenkov, Maximilien Dreveton Statistical Analysis of Networks (Hardcover)
Konstantin Avrachenkov, Maximilien Dreveton
R2,831 Discovery Miles 28 310 Ships in 10 - 15 working days

This book is a general introduction to the statistical analysis of networks, and can serve both as a research monograph and as a textbook. Numerous fundamental tools and concepts needed for the analysis of networks are presented, such as network modeling, community detection, graph-based semi-supervised learning and sampling in networks. The description of these concepts is self-contained, with both theoretical justifications and applications provided for the presented algorithms.Researchers, including postgraduate students, working in the area of network science, complex network analysis, or social network analysis, will find up-to-date statistical methods relevant to their research tasks. This book can also serve as textbook material for courses related to thestatistical approach to the analysis of complex networks.In general, the chapters are fairly independent and self-supporting, and the book could be used for course composition "a la carte". Nevertheless, Chapter 2 is needed to a certain degree for all parts of the book. It is also recommended to read Chapter 4 before reading Chapters 5 and 6, but this is not absolutely necessary. Reading Chapter 3 can also be helpful before reading Chapters 5 and 7. As prerequisites for reading this book, a basic knowledge in probability, linear algebra and elementary notions of graph theory is advised. Appendices describing required notions from the above mentioned disciplines have been added to help readers gain further understanding.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ethical Hacking for Beginners - How to…
Attila Kovacs Hardcover R844 R699 Discovery Miles 6 990
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Internet of Things (IoT) for Automated…
Yasser Ismail Hardcover R3,456 R3,228 Discovery Miles 32 280
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610

 

Partners