0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (253)
  • R250 - R500 (866)
  • R500+ (13,679)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

#Myprivacy #Myright - Protect It While You Can (Hardcover): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Hardcover)
Robin M Singh
R536 Discovery Miles 5 360 Ships in 10 - 15 working days
The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover): Dewayne Hart The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover)
Dewayne Hart
R742 Discovery Miles 7 420 Ships in 10 - 15 working days
Systems Engineering Neural Networks (Hardcover): A Migliaccio Systems Engineering Neural Networks (Hardcover)
A Migliaccio
R2,817 Discovery Miles 28 170 Ships in 18 - 22 working days

A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.

Community Engagement in the Online Space (Hardcover): Michelle Dennis, James H Albert Community Engagement in the Online Space (Hardcover)
Michelle Dennis, James H Albert
R5,370 Discovery Miles 53 700 Ships in 18 - 22 working days

Since the advent of the internet, online communities have emerged as a way for users to share their common interests and connect with others with ease. As the possibilities of the online world grew and the COVID-19 pandemic raged across the world, many organizations recognized the utility in not only providing further services online, but also in transitioning operations typically fulfilled in-person to an online space. As society approaches a reality in which most community practices have moved to online spaces, it is essential that community leaders remain knowledgeable on the best practices in cultivating engagement. Community Engagement in the Online Space evaluates key issues and practices pertaining to community engagement in remote settings. It analyzes various community engagement efforts within remote education, online groups, and remote work. This book further reviews the best practices for community engagement and considerations for the optimization of these practices for effective virtual delivery to support emergency environmental challenges, such as pandemic conditions. Covering topics such as community belonging, global health virtual practicum, and social media engagement, this premier reference source is an excellent resource for program directors, faculty and administrators of both K-12 and higher education, students of higher education, business leaders and executives, IT professionals, online community moderators, librarians, researchers, and academicians.

System of Controls - I.T.'s Guide to Managing Cyber Risk (Hardcover): William D Reed System of Controls - I.T.'s Guide to Managing Cyber Risk (Hardcover)
William D Reed
R947 R826 Discovery Miles 8 260 Save R121 (13%) Ships in 18 - 22 working days
Demystifying Graph Data Science - Graph algorithms, analytics methods, platforms, databases, and use cases (Hardcover): Pethuru... Demystifying Graph Data Science - Graph algorithms, analytics methods, platforms, databases, and use cases (Hardcover)
Pethuru Raj, Abhishek Kumar, Vicente Garcia Diaz, Nachamai Muthuraman
R3,333 R3,010 Discovery Miles 30 100 Save R323 (10%) Ships in 18 - 22 working days

With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to create huge sets of poly-structured digital data. Corporations are continuously seeking fresh ways to use their data to drive business innovations and disruptions to bring in real digital transformation. Data science (DS) is proving to be the one-stop solution for simplifying the process of knowledge discovery and dissemination out of massive amounts of multi-structured data. Supported by query languages, databases, algorithms, platforms, analytics methods and machine and deep learning (ML and DL) algorithms, graphs are now emerging as a new data structure for optimally representing a variety of data and their intimate relationships. Compared to traditional analytics methods, the connectedness of data points in graph analytics facilitates the identification of clusters of related data points based on levels of influence, association, interaction frequency and probability. Graph analytics is being empowered through a host of path-breaking analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book aims to explain the various aspects and importance of graph data science. The authors from both academia and industry cover algorithms, analytics methods, platforms and databases that are intrinsically capable of creating business value by intelligently leveraging connected data. This book will be a valuable reference for ICTs industry and academic researchers, scientists and engineers, and lecturers and advanced students in the fields of data analytics, data science, cloud/fog/edge architecture, internet of things, artificial intelligence/machine and deep learning, and related fields of applications. It will also be of interest to analytics professionals in industry and IT operations teams.

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (Hardcover): Maurice Dawson, Oteng Tabona,... Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (Hardcover)
Maurice Dawson, Oteng Tabona, Thabiso Maupong
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (Hardcover): Arshi Naim, Praveen Kumar Malik,... Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (Hardcover)
Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi
R6,200 Discovery Miles 62 000 Ships in 18 - 22 working days

The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.

Blockchain Technology in Corporate Governance - Transforming Business and Industries (Hardcover): K Sood Blockchain Technology in Corporate Governance - Transforming Business and Industries (Hardcover)
K Sood
R4,308 Discovery Miles 43 080 Ships in 10 - 15 working days

BLOCKCHAIN TECHNOLOGY IN CORPORATE GOVERANCE This book investigates the recent applications of blockchain technology in financial services, energy sector, and summarizes regulatory responses, to set the scene for future work on corporate governance. This edited book highlights the current governance framework for the blockchain and its development as a self-governing framework. It discusses blockchain technology's effectiveness in developing solutions for supply chains, trade finance, and banking. Moreover, it shows how banking and financial institutions are the major beneficiaries of this decentralized technology. Furthermore, the book outlines the link between company governance theories, regulatory, ethical, and social controls, and blockchain adoption. It also investigates the recent applications of blockchain technology in financial services, the health sector, and the energy sector. Audience The book is specially designed for researchers, industrialists, engineers, graduate students, and policymakers, who aspire to learn, discuss, and carry out further research into the opportunities offered by blockchain and the possible ways of regulating it.

Network Science - Analysis and Optimization Algorithms for Real-World Applications (Hardcover): CAR Pinheiro Network Science - Analysis and Optimization Algorithms for Real-World Applications (Hardcover)
CAR Pinheiro
R2,245 Discovery Miles 22 450 Ships in 18 - 22 working days

Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results. Written by a highly qualified author with significant experience in the field, Network Science also includes information on: Sub-networks, covering connected components, bi-connected components, community detection, k-core decomposition, reach network, projection, nodes similarity and pattern matching Network centrality measures, covering degree, influence, clustering coefficient, closeness, betweenness, eigenvector, PageRank, hub and authority Network optimization, covering clique, cycle, linear assignment, minimum-cost network flow, maximum network flow problem, minimum cut, minimum spanning tree, path, shortest path, transitive closure, traveling salesman problem, vehicle routing problem and topological sort With in-depth and authoritative coverage of the subject and many case studies to convey concepts clearly, Network Science is a helpful training resource for professional and industry workers in, telecommunications, insurance, retail, banking, healthcare, public sector, among others, plus as a supplementary reading for an introductory Network Science course for undergraduate students.

Cybersecurity Issues and Challenges for Business and FinTech Applications (Hardcover): Saqib Saeed, Abdullah M. Almuhaideb,... Cybersecurity Issues and Challenges for Business and FinTech Applications (Hardcover)
Saqib Saeed, Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Yousaf Bin Zikria
R7,752 Discovery Miles 77 520 Ships in 18 - 22 working days

Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

Handbook of Research on Cyber Security Intelligence and Analytics (Hardcover): Jena Om Prakash, H L Gururaj, M.R. Pooja, S.P.... Handbook of Research on Cyber Security Intelligence and Analytics (Hardcover)
Jena Om Prakash, H L Gururaj, M.R. Pooja, S.P. Pavan Kumar
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. The Handbook of Research on Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,097 Discovery Miles 10 970 Ships in 18 - 22 working days
Global Perspectives on Information Security Regulations - Compliance, Controls, and Assurance (Hardcover): Guillermo A. Francia... Global Perspectives on Information Security Regulations - Compliance, Controls, and Assurance (Hardcover)
Guillermo A. Francia Iii, Jeffrey S. Zanzig
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Recent years have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information; the privacy of consumers; and the continuity of economic activity. Compliance is a measure of the extent to which a current state is in conformance with a desired state. The desired state is commonly operationalized through specific business objectives, professional standards, and regulations. Assurance services provide a means of evaluating the level of compliance with various cybersecurity requirements. The proposed book will summarize current cybersecurity guidance and provide a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators. This publication will provide a synopsis of current cybersecurity guidance that organizations should consider in establishing and updating their cybersecurity systems. Assurance services will also be addressed so that management and their auditors can regularly evaluate their extent of compliance. This book should be published because its theme will provide company management, practitioners, and academics with a good summary of current guidance and how to conduct assurance of appropriate compliance.

Trustworthy Autonomic Computing (Hardcover): Thaddeus Eze Trustworthy Autonomic Computing (Hardcover)
Thaddeus Eze
R2,997 R2,712 Discovery Miles 27 120 Save R285 (10%) Ships in 18 - 22 working days

The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.

E-Learning and Digital Education in the Twenty-First Century (Hardcover): M. Mahruf C. Shohel E-Learning and Digital Education in the Twenty-First Century (Hardcover)
M. Mahruf C. Shohel
R3,584 Discovery Miles 35 840 Ships in 18 - 22 working days
A Hacker, I Am (Hardcover): Craig Ford A Hacker, I Am (Hardcover)
Craig Ford
R892 R771 Discovery Miles 7 710 Save R121 (14%) Ships in 18 - 22 working days
Research Anthology on Business Aspects of Cybersecurity (Hardcover): Information Resources Management Association Research Anthology on Business Aspects of Cybersecurity (Hardcover)
Information Resources Management Association
R11,427 Discovery Miles 114 270 Ships in 18 - 22 working days

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4 (Hardcover)
Information R Management Association
R12,633 Discovery Miles 126 330 Ships in 18 - 22 working days
Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover): Khatoun Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover)
Khatoun
R3,483 Discovery Miles 34 830 Ships in 18 - 22 working days

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 3... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 3 (Hardcover)
Information R Management Association
R12,630 Discovery Miles 126 300 Ships in 18 - 22 working days
Tor and Darknet 4 Donkeys - A Practical Beginner's Guide to the Secrets of Deep Web & Internet (Paperback): Sam K Tor and Darknet 4 Donkeys - A Practical Beginner's Guide to the Secrets of Deep Web & Internet (Paperback)
Sam K
R280 Discovery Miles 2 800 Ships in 10 - 15 working days
Opinion Mining and Text Analytics on Literary Works and Social Media (Hardcover): Pantea Keikhosrokiani, Moussa Pourya Asl Opinion Mining and Text Analytics on Literary Works and Social Media (Hardcover)
Pantea Keikhosrokiani, Moussa Pourya Asl
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 2... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 2 (Hardcover)
Information R Management Association
R12,639 Discovery Miles 126 390 Ships in 18 - 22 working days
Computer Networking and Cybersecurity (Paperback): Quinn Kiser Computer Networking and Cybersecurity (Paperback)
Quinn Kiser
R794 R698 Discovery Miles 6 980 Save R96 (12%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
VLSI for Artificial Intelligence and…
Jose G.Delgado- Frias, Will Moore Hardcover R2,471 Discovery Miles 24 710
Mining Very Large Databases with…
Alex A. Freitas, Simon H. Lavington Hardcover R5,260 Discovery Miles 52 600
Green IT Engineering: Social, Business…
Vyacheslav Kharchenko, Yuriy Kondratenko, … Hardcover R4,127 Discovery Miles 41 270
Intelligent Techniques and Tools for…
Panagiotis Chountas, Ilias Petrounias Hardcover R5,242 Discovery Miles 52 420
Immunology: The Making of a Modern…
Richard B. Gallagher, Jean Gilder, … Hardcover R1,199 Discovery Miles 11 990
Evolutionary Concepts in Immunology
Robert Jack, Louis Du Pasquier Hardcover R2,420 Discovery Miles 24 200
Novel Therapeutic Agents for the…
Vibeke Strand, David L. Scot, … Hardcover R7,616 Discovery Miles 76 160
Metchnikoff and the Origins of…
Alfred I. Tauber, Leon Chernyak Hardcover R5,936 Discovery Miles 59 360
How Can I Make the Most of the Rest of…
Nicky Gumbel Paperback R158 Discovery Miles 1 580
Disruptive Thinking - A Daring Strategy…
T.D. Jakes Paperback R300 R268 Discovery Miles 2 680

 

Partners