0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (275)
  • R250 - R500 (882)
  • R500+ (13,601)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback): Florian Skopik, Paul Dr. Smith Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback)
Florian Skopik, Paul Dr. Smith
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Cyber Security (Hardcover): Yu Zhou, Jia Li, Li Ding Cyber Security (Hardcover)
Yu Zhou, Jia Li, Li Ding
R1,297 Discovery Miles 12 970 Ships in 18 - 22 working days
Selfies as a Mode of Social Media and Work Space Research (Hardcover): Shalin Hai-Jew Selfies as a Mode of Social Media and Work Space Research (Hardcover)
Shalin Hai-Jew
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.

Ecological Design of Smart Home Networks - Technologies, Social Impact and Sustainability (Hardcover): N. Saito, D Menga Ecological Design of Smart Home Networks - Technologies, Social Impact and Sustainability (Hardcover)
N. Saito, D Menga
R5,402 R4,998 Discovery Miles 49 980 Save R404 (7%) Ships in 10 - 15 working days

This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation. Part One outlines the key principles and technologies needed for ecological smart home networks. Beginning with a thorough overview of the concept behind ecological smart home network design, the book reviews such important areas as power line communications, hybrid systems and middleware platforms. Part Two then goes on to discuss some important applications of this technology, with wireless smart sensor networks for home and telecare, and smart home networking for content and energy management (including the intelligent Zero Emission Urban System), all explored in detail.

Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover): Veljko Milutinovic, Milos Kotlar Handbook of Research on Methodologies and Applications of Supercomputing (Hardcover)
Veljko Milutinovic, Milos Kotlar
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing.

Information Security: Procedures, Standards and Management (Hardcover): Fiona Hobbs Information Security: Procedures, Standards and Management (Hardcover)
Fiona Hobbs
R3,279 R2,969 Discovery Miles 29 690 Save R310 (9%) Ships in 18 - 22 working days
Computational Network Science - An Algorithmic Approach (Paperback): Henry Hexmoor Computational Network Science - An Algorithmic Approach (Paperback)
Henry Hexmoor
R783 Discovery Miles 7 830 Ships in 10 - 15 working days

The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatible datasets, which has kept it from being a truly universal discipline. Computational Network Science seeks to unify the methods used to analyze these diverse fields. This book provides an introduction to the field of Network Science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way. This new approach would remove the need for tedious human-based analysis of different datasets and help researchers spend more time on the qualitative aspects of network science research.

Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover)
Information R Management Association
R13,746 Discovery Miles 137 460 Ships in 18 - 22 working days
Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,163 Discovery Miles 61 630 Ships in 18 - 22 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,076 Discovery Miles 30 760 Ships in 18 - 22 working days
Information Systems: A Digital World (Hardcover): Brian Jackson Information Systems: A Digital World (Hardcover)
Brian Jackson
R2,818 R2,564 Discovery Miles 25 640 Save R254 (9%) Ships in 18 - 22 working days
Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Cloud Computing (Hardcover): Sam Revere Cloud Computing (Hardcover)
Sam Revere
R3,029 R2,745 Discovery Miles 27 450 Save R284 (9%) Ships in 18 - 22 working days
Vehicular Communications and Networks - Architectures, Protocols, Operation and Deployment (Hardcover): W. Chen Vehicular Communications and Networks - Architectures, Protocols, Operation and Deployment (Hardcover)
W. Chen
R4,921 Discovery Miles 49 210 Ships in 10 - 15 working days

Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment discusses VANETs (Vehicular Ad-hoc Networks) or VCS (Vehicular Communication Systems), which can improve safety, decrease fuel consumption, and increase the capacity of existing roadways and which is critical for the Intelligent Transportation System (ITS) industry. Part one covers architectures for VCS, part two describes the physical layer, antenna technologies and propagation models, part three explores protocols, algorithms, routing and information dissemination, and part four looks at the operation and deployment of vehicular communications and networks.

Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback): Babak Akhgar,... Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback)
Babak Akhgar, Gregory B Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, …
R1,382 Discovery Miles 13 820 Ships in 10 - 15 working days

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

Introduction to US Cybersecurity Careers (Paperback): Henry Dalziel Introduction to US Cybersecurity Careers (Paperback)
Henry Dalziel
R838 Discovery Miles 8 380 Ships in 10 - 15 working days

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback): Henry Dalziel How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback)
Henry Dalziel; Edited by Simon Crosby
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R826 Discovery Miles 8 260 Ships in 10 - 15 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

HCISPP Study Guide (Paperback): Timothy Virtue, Justin Rainey HCISPP Study Guide (Paperback)
Timothy Virtue, Justin Rainey
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC(2). The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,085 Discovery Miles 90 850 Ships in 18 - 22 working days
Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,090 Discovery Miles 90 900 Ships in 18 - 22 working days
Next Generation Wireless Network Security and Privacy (Hardcover): Kamaljit I Lakhtaria Next Generation Wireless Network Security and Privacy (Hardcover)
Kamaljit I Lakhtaria
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback): Deborah Gonzalez Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback)
Deborah Gonzalez
R813 Discovery Miles 8 130 Ships in 10 - 15 working days

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Approach To Professional Practice
Nelouise Geyer Paperback R622 R578 Discovery Miles 5 780
Guide to Networking Essentials
Greg Tomsho Paperback R1,548 R1,299 Discovery Miles 12 990
Street God
Dimas Salaberrios Paperback  (1)
R400 R378 Discovery Miles 3 780
Micro-Tec Spanner Combination (15mm)
Cancer - Navigating The Journey
Cherry Armstrong Paperback R390 R360 Discovery Miles 3 600
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Industrial Brushless Servomotors
Peter Moreton Hardcover R2,035 Discovery Miles 20 350
HuntKey Frozen 200 CPU Cooler (Black)
R145 Discovery Miles 1 450
Control of Integral Processes with Dead…
Antonio Visioli, Qing-Chang Zhong Hardcover R4,045 Discovery Miles 40 450
Thermaltake Premium Concentrate Coolant…
R347 Discovery Miles 3 470

 

Partners