0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (289)
  • R250 - R500 (920)
  • R500+ (13,753)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (Hardcover): Maurice Dawson, Oteng Tabona,... Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (Hardcover)
Maurice Dawson, Oteng Tabona, Thabiso Maupong
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Community Engagement in the Online Space (Hardcover): Michelle Dennis, James H Albert Community Engagement in the Online Space (Hardcover)
Michelle Dennis, James H Albert
R5,370 Discovery Miles 53 700 Ships in 18 - 22 working days

Since the advent of the internet, online communities have emerged as a way for users to share their common interests and connect with others with ease. As the possibilities of the online world grew and the COVID-19 pandemic raged across the world, many organizations recognized the utility in not only providing further services online, but also in transitioning operations typically fulfilled in-person to an online space. As society approaches a reality in which most community practices have moved to online spaces, it is essential that community leaders remain knowledgeable on the best practices in cultivating engagement. Community Engagement in the Online Space evaluates key issues and practices pertaining to community engagement in remote settings. It analyzes various community engagement efforts within remote education, online groups, and remote work. This book further reviews the best practices for community engagement and considerations for the optimization of these practices for effective virtual delivery to support emergency environmental challenges, such as pandemic conditions. Covering topics such as community belonging, global health virtual practicum, and social media engagement, this premier reference source is an excellent resource for program directors, faculty and administrators of both K-12 and higher education, students of higher education, business leaders and executives, IT professionals, online community moderators, librarians, researchers, and academicians.

Demystifying Graph Data Science - Graph algorithms, analytics methods, platforms, databases, and use cases (Hardcover): Pethuru... Demystifying Graph Data Science - Graph algorithms, analytics methods, platforms, databases, and use cases (Hardcover)
Pethuru Raj, Abhishek Kumar, Vicente Garcia Diaz, Nachamai Muthuraman
R3,333 R3,010 Discovery Miles 30 100 Save R323 (10%) Ships in 18 - 22 working days

With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to create huge sets of poly-structured digital data. Corporations are continuously seeking fresh ways to use their data to drive business innovations and disruptions to bring in real digital transformation. Data science (DS) is proving to be the one-stop solution for simplifying the process of knowledge discovery and dissemination out of massive amounts of multi-structured data. Supported by query languages, databases, algorithms, platforms, analytics methods and machine and deep learning (ML and DL) algorithms, graphs are now emerging as a new data structure for optimally representing a variety of data and their intimate relationships. Compared to traditional analytics methods, the connectedness of data points in graph analytics facilitates the identification of clusters of related data points based on levels of influence, association, interaction frequency and probability. Graph analytics is being empowered through a host of path-breaking analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book aims to explain the various aspects and importance of graph data science. The authors from both academia and industry cover algorithms, analytics methods, platforms and databases that are intrinsically capable of creating business value by intelligently leveraging connected data. This book will be a valuable reference for ICTs industry and academic researchers, scientists and engineers, and lecturers and advanced students in the fields of data analytics, data science, cloud/fog/edge architecture, internet of things, artificial intelligence/machine and deep learning, and related fields of applications. It will also be of interest to analytics professionals in industry and IT operations teams.

Handbook of Research on Cyber Security Intelligence and Analytics (Hardcover): Jena Om Prakash, H L Gururaj, M.R. Pooja, S.P.... Handbook of Research on Cyber Security Intelligence and Analytics (Hardcover)
Jena Om Prakash, H L Gururaj, M.R. Pooja, S.P. Pavan Kumar
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. The Handbook of Research on Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.

Global Perspectives on Information Security Regulations - Compliance, Controls, and Assurance (Hardcover): Guillermo A. Francia... Global Perspectives on Information Security Regulations - Compliance, Controls, and Assurance (Hardcover)
Guillermo A. Francia Iii, Jeffrey S. Zanzig
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Recent years have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information; the privacy of consumers; and the continuity of economic activity. Compliance is a measure of the extent to which a current state is in conformance with a desired state. The desired state is commonly operationalized through specific business objectives, professional standards, and regulations. Assurance services provide a means of evaluating the level of compliance with various cybersecurity requirements. The proposed book will summarize current cybersecurity guidance and provide a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators. This publication will provide a synopsis of current cybersecurity guidance that organizations should consider in establishing and updating their cybersecurity systems. Assurance services will also be addressed so that management and their auditors can regularly evaluate their extent of compliance. This book should be published because its theme will provide company management, practitioners, and academics with a good summary of current guidance and how to conduct assurance of appropriate compliance.

Cybersecurity Issues and Challenges for Business and FinTech Applications (Hardcover): Saqib Saeed, Abdullah M. Almuhaideb,... Cybersecurity Issues and Challenges for Business and FinTech Applications (Hardcover)
Saqib Saeed, Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Yousaf Bin Zikria
R7,752 Discovery Miles 77 520 Ships in 18 - 22 working days

Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

E-Learning and Digital Education in the Twenty-First Century (Hardcover): M. Mahruf C. Shohel E-Learning and Digital Education in the Twenty-First Century (Hardcover)
M. Mahruf C. Shohel
R3,584 Discovery Miles 35 840 Ships in 18 - 22 working days
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots (Paperback): Hailong Huang, Andrey V.... Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots (Paperback)
Hailong Huang, Andrey V. Savkin, Chao Huang
R2,763 Discovery Miles 27 630 Ships in 10 - 15 working days

Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wireless sensor networks and cellular networks. For wireless sensor networks, the book presents approaches using mobile robots or UAVs to collect sensory data from sensor nodes. For cellular networks, it discusses the approaches to using UAVs to work as aerial base stations to serve cellular users. In addition, the book covers the challenges involved in these two networks, existing approaches (e.g., how to use the public transportation vehicles to play the role of mobile sinks to collect sensory data from sensor nodes), and potential methods to address open questions.

Research Anthology on Business Aspects of Cybersecurity (Hardcover): Information Resources Management Association Research Anthology on Business Aspects of Cybersecurity (Hardcover)
Information Resources Management Association
R11,427 Discovery Miles 114 270 Ships in 18 - 22 working days

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.

Opinion Mining and Text Analytics on Literary Works and Social Media (Hardcover): Pantea Keikhosrokiani, Moussa Pourya Asl Opinion Mining and Text Analytics on Literary Works and Social Media (Hardcover)
Pantea Keikhosrokiani, Moussa Pourya Asl
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.

#Myprivacy #Myright - Protect It While You Can (Hardcover): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Hardcover)
Robin M Singh
R536 Discovery Miles 5 360 Ships in 10 - 15 working days
System of Controls - I.T.'s Guide to Managing Cyber Risk (Hardcover): William D Reed System of Controls - I.T.'s Guide to Managing Cyber Risk (Hardcover)
William D Reed
R947 R826 Discovery Miles 8 260 Save R121 (13%) Ships in 18 - 22 working days
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 3... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 3 (Hardcover)
Information R Management Association
R12,630 Discovery Miles 126 300 Ships in 18 - 22 working days
The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover): Dewayne Hart The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover)
Dewayne Hart
R742 Discovery Miles 7 420 Ships in 10 - 15 working days
Cybersecurity for Connected Medical Devices (Paperback): Arnab Ray Cybersecurity for Connected Medical Devices (Paperback)
Arnab Ray
R2,061 Discovery Miles 20 610 Ships in 10 - 15 working days

The cybersecurity of connected medical devices is one of the biggest challenges facing healthcare today. The compromise of a medical device can result in severe consequences for both patient health and patient data. Cybersecurity for Connected Medical Devices covers all aspects of medical device cybersecurity, with a focus on cybersecurity capability development and maintenance, system and software threat modeling, secure design of medical devices, vulnerability management, and integrating cybersecurity design aspects into a medical device manufacturer's Quality Management Systems (QMS). This book is geared towards engineers interested in the medical device cybersecurity space, regulatory, quality, and human resources specialists, and organizational leaders interested in building a medical device cybersecurity program.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 2... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 2 (Hardcover)
Information R Management Association
R12,639 Discovery Miles 126 390 Ships in 18 - 22 working days
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 1... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 1 (Hardcover)
Information R Management Association
R12,620 Discovery Miles 126 200 Ships in 18 - 22 working days
Advances in Malware and Data-Driven Network Security (Hardcover): Brij B. Gupta Advances in Malware and Data-Driven Network Security (Hardcover)
Brij B. Gupta
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover): Mohit Dua, Ankit Kumar Jain Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover)
Mohit Dua, Ankit Kumar Jain
R7,962 Discovery Miles 79 620 Ships in 18 - 22 working days

The artificial intelligence subset machine learning has become a popular technique in professional fields as many are finding new ways to apply this trending technology into their everyday practices. Two fields that have majorly benefited from this are pattern recognition and information security. The ability of these intelligent algorithms to learn complex patterns from data and attain new performance techniques has created a wide variety of uses and applications within the data security industry. There is a need for research on the specific uses machine learning methods have within these fields, along with future perspectives. Machine Learning Techniques for Pattern Recognition and Information Security is a collection of innovative research on the current impact of machine learning methods within data security as well as its various applications and newfound challenges. While highlighting topics including anomaly detection systems, biometrics, and intrusion management, this book is ideally designed for industrial experts, researchers, IT professionals, network developers, policymakers, computer scientists, educators, and students seeking current research on implementing machine learning tactics to enhance the performance of information security.

Handbook of Research on Cyber Approaches to Public Administration and Social Policy (Hardcover): Fahri OEzsungur Handbook of Research on Cyber Approaches to Public Administration and Social Policy (Hardcover)
Fahri OEzsungur
R7,977 Discovery Miles 79 770 Ships in 18 - 22 working days

During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.

Inclusive Radio Communications for 5G and Beyond (Paperback): Claude Oestges, Francois Quitin Inclusive Radio Communications for 5G and Beyond (Paperback)
Claude Oestges, Francois Quitin
R2,896 Discovery Miles 28 960 Ships in 10 - 15 working days

Inclusive Radio Communication Networks for 5G and Beyond is based on the COST IRACON project that consists of 500 researchers from academia and industry, with 120 institutions from Europe, US and the Far East involved. The book presents state-of-the-art design and analysis methods for 5G (and beyond) radio communication networks, along with key challenges and issues related to the development of 5G networks. This book is Open Access and was funded by: CNIT - Consorzio Nazionale Interuniversitario per le Telecomunicazioni European Association for Communications and Networking (EURACON), AISBL

Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition): David R. Bull, Fan Zhang Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition)
David R. Bull, Fan Zhang
R2,606 Discovery Miles 26 060 Ships in 10 - 15 working days

Intelligent Image and Video Compression: Communicating Pictures, Second Edition explains the requirements, analysis, design and application of a modern video coding system. It draws on the authors' extensive academic and professional experience in this field to deliver a text that is algorithmically rigorous yet accessible, relevant to modern standards and practical. It builds on a thorough grounding in mathematical foundations and visual perception to demonstrate how modern image and video compression methods can be designed to meet the rate-quality performance levels demanded by today's applications and users, in the context of prevailing network constraints. "David Bull and Fan Zhang have written a timely and accessible book on the topic of image and video compression. Compression of visual signals is one of the great technological achievements of modern times, and has made possible the great successes of streaming and social media and digital cinema. Their book, Intelligent Image and Video Compression covers all the salient topics ranging over visual perception, information theory, bandpass transform theory, motion estimation and prediction, lossy and lossless compression, and of course the compression standards from MPEG (ranging from H.261 through the most modern H.266, or VVC) and the open standards VP9 and AV-1. The book is replete with clear explanations and figures, including color where appropriate, making it quite accessible and valuable to the advanced student as well as the expert practitioner. The book offers an excellent glossary and as a bonus, a set of tutorial problems. Highly recommended!" --Al Bovik

Managing Resources for Futuristic Wireless Networks (Hardcover): Tariq Umer Managing Resources for Futuristic Wireless Networks (Hardcover)
Tariq Umer
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

The key parameter that needs to be considered when planning the management of resources in futuristic wireless networks is a balanced approach to resource distribution. A balanced approach is necessary to provide an unbiased working environment for the distribution, sharing, allocation, and supply of resources among the devices of the wireless network. Equal resource distribution also maintains balance and stability between the operations of communication systems and thus improves the performance of wireless networks. Managing Resources for Futuristic Wireless Networks is a pivotal reference source that presents research related to the control and management of key parameters of bandwidth, spectrum sensing, channel selection, resource sharing, and task scheduling, which is necessary to ensure the efficient operation of wireless networks. Featuring topics that include vehicular ad-hoc networks, resource management, and the internet of things, this publication is ideal for professionals and researchers working in the field of networking, information and knowledge management, and communication sciences. Moreover, the book will provide insights and support executives concerned with the management of expertise, knowledge, information, and organizational development in different types of work communities and environments.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4 (Hardcover)
Information R Management Association
R12,633 Discovery Miles 126 330 Ships in 18 - 22 working days
Advances in Delay-Tolerant Networks (DTNs) - Architecture and Enhanced Performance (Paperback, 2nd edition): Joel J. P. C.... Advances in Delay-Tolerant Networks (DTNs) - Architecture and Enhanced Performance (Paperback, 2nd edition)
Joel J. P. C. Rodrigues
R4,669 Discovery Miles 46 690 Ships in 10 - 15 working days

Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tactile Internet - with…
Frank H. P. Fitzek, Shu-Chen Li, … Paperback R2,596 Discovery Miles 25 960
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
The Digital Pivot - Secrets of Online…
Eric Schwartzman Hardcover R660 Discovery Miles 6 600
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140

 

Partners