0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback): Florian Skopik, Paul Dr. Smith Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback)
Florian Skopik, Paul Dr. Smith
R2,299 Discovery Miles 22 990 Ships in 12 - 19 working days

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,857 Discovery Miles 98 570 Ships in 10 - 15 working days
AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover): Documentation Team AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover)
Documentation Team
R2,580 R2,113 Discovery Miles 21 130 Save R467 (18%) Ships in 10 - 15 working days
Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and... Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and Updated ed.)
Ian Lamont
R615 Discovery Miles 6 150 Ships in 12 - 19 working days
Digital Twin Technology (Paperback): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Paperback)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R1,459 Discovery Miles 14 590 Ships in 12 - 19 working days
Cloud Computing & Virtualization (Hardcover, St ed.): R Rajeswara Rao, V Subba Ramaiah Cloud Computing & Virtualization (Hardcover, St ed.)
R Rajeswara Rao, V Subba Ramaiah
R1,885 R1,615 Discovery Miles 16 150 Save R270 (14%) Ships in 10 - 15 working days
AIoT Technologies and Applications for Smart Environments (Hardcover): Mamoun Alazab, Meenu Gupta, Shakeel Ahmed AIoT Technologies and Applications for Smart Environments (Hardcover)
Mamoun Alazab, Meenu Gupta, Shakeel Ahmed
R3,382 R3,052 Discovery Miles 30 520 Save R330 (10%) Ships in 10 - 15 working days

Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.

Deep Learning for Security and Privacy Preservation in IoT (Hardcover, 1st ed. 2021): Aaisha Makkar, Neeraj Kumar Deep Learning for Security and Privacy Preservation in IoT (Hardcover, 1st ed. 2021)
Aaisha Makkar, Neeraj Kumar
R5,262 Discovery Miles 52 620 Ships in 12 - 19 working days

This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.

Network Flows - Pearson New International Edition (Paperback, Pearson New International Edition): Ravindra Ahuja, Thomas... Network Flows - Pearson New International Edition (Paperback, Pearson New International Edition)
Ravindra Ahuja, Thomas Magnanti, James Orlin
R2,679 Discovery Miles 26 790 Ships in 12 - 19 working days

A comprehensive introduction to network flows that brings together the classic and the contemporary aspects of the field, and provides an integrative view of theory, algorithms, and applications.

Safety and Security Issues in Technical Infrastructures (Hardcover): David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada Safety and Security Issues in Technical Infrastructures (Hardcover)
David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada
R5,953 Discovery Miles 59 530 Ships in 10 - 15 working days

In the modern age of urbanisation, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernisation of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.

Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback): Babak Akhgar,... Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback)
Babak Akhgar, Gregory B Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, …
R1,465 Discovery Miles 14 650 Ships in 12 - 19 working days

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

Selfies as a Mode of Social Media and Work Space Research (Hardcover): Shalin Hai-Jew Selfies as a Mode of Social Media and Work Space Research (Hardcover)
Shalin Hai-Jew
R4,982 Discovery Miles 49 820 Ships in 10 - 15 working days

The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.

Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,344 Discovery Miles 13 440 Ships in 12 - 19 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,091 Discovery Miles 10 910 Ships in 12 - 19 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Next Generation Wireless Network Security and Privacy (Hardcover): Kamaljit I Lakhtaria Next Generation Wireless Network Security and Privacy (Hardcover)
Kamaljit I Lakhtaria
R5,562 Discovery Miles 55 620 Ships in 10 - 15 working days

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Cybersecurity Data Science - Best Practices in an Emerging Profession (Hardcover, 1st ed. 2021): Scott Mongeau, Andrzej... Cybersecurity Data Science - Best Practices in an Emerging Profession (Hardcover, 1st ed. 2021)
Scott Mongeau, Andrzej Hajdasinski
R4,259 Discovery Miles 42 590 Ships in 12 - 19 working days

This book encompasses a systematic exploration of Cybersecurity Data Science (CSDS) as an emerging profession, focusing on current versus idealized practice. This book also analyzes challenges facing the emerging CSDS profession, diagnoses key gaps, and prescribes treatments to facilitate advancement. Grounded in the management of information systems (MIS) discipline, insights derive from literature analysis and interviews with 50 global CSDS practitioners. CSDS as a diagnostic process grounded in the scientific method is emphasized throughout Cybersecurity Data Science (CSDS) is a rapidly evolving discipline which applies data science methods to cybersecurity challenges. CSDS reflects the rising interest in applying data-focused statistical, analytical, and machine learning-driven methods to address growing security gaps. This book offers a systematic assessment of the developing domain. Advocacy is provided to strengthen professional rigor and best practices in the emerging CSDS profession. This book will be of interest to a range of professionals associated with cybersecurity and data science, spanning practitioner, commercial, public sector, and academic domains. Best practices framed will be of interest to CSDS practitioners, security professionals, risk management stewards, and institutional stakeholders. Organizational and industry perspectives will be of interest to cybersecurity analysts, managers, planners, strategists, and regulators. Research professionals and academics are presented with a systematic analysis of the CSDS field, including an overview of the state of the art, a structured evaluation of key challenges, recommended best practices, and an extensive bibliography.

The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R690 R636 Discovery Miles 6 360 Save R54 (8%) Ships in 12 - 19 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Information Security: Principles and Practices (Hardcover): Miles Carr Information Security: Principles and Practices (Hardcover)
Miles Carr
R3,109 R2,820 Discovery Miles 28 200 Save R289 (9%) Ships in 10 - 15 working days
Computational Network Science - An Algorithmic Approach (Paperback): Henry Hexmoor Computational Network Science - An Algorithmic Approach (Paperback)
Henry Hexmoor
R828 Discovery Miles 8 280 Ships in 12 - 19 working days

The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatible datasets, which has kept it from being a truly universal discipline. Computational Network Science seeks to unify the methods used to analyze these diverse fields. This book provides an introduction to the field of Network Science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way. This new approach would remove the need for tedious human-based analysis of different datasets and help researchers spend more time on the qualitative aspects of network science research.

Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,685 Discovery Miles 66 850 Ships in 10 - 15 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Discrete Password Logbook - Kitty Cats Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Kitty Cats Edition (Hardcover)
Suzeteo Enterprises
R542 Discovery Miles 5 420 Ships in 10 - 15 working days
Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,333 Discovery Miles 33 330 Ships in 10 - 15 working days
AWS Greengrass Developer Guide (Hardcover): Documentation Team AWS Greengrass Developer Guide (Hardcover)
Documentation Team
R1,262 Discovery Miles 12 620 Ships in 10 - 15 working days
Big Data Science & Analytics - A Hands-On Approach (Hardcover): Arshdeep Bahga, Vijay Madisetti Big Data Science & Analytics - A Hands-On Approach (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R1,637 Discovery Miles 16 370 Ships in 12 - 19 working days
AWS Snowball Developer Guide (Hardcover): Documentation Team AWS Snowball Developer Guide (Hardcover)
Documentation Team
R2,307 R1,840 Discovery Miles 18 400 Save R467 (20%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,557 Discovery Miles 15 570
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,397 Discovery Miles 13 970
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,824 Discovery Miles 58 240
Introduction to Copper Cabling…
John Crisp Paperback R1,024 Discovery Miles 10 240
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,540 Discovery Miles 15 400

 

Partners