0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (854)
  • R500+ (14,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R11,205 Discovery Miles 112 050 Ships in 10 - 15 working days
Data Governance Success - Growing and Sustaining Data Governance (Hardcover, 1st ed. 2021): Rupa Mahanti Data Governance Success - Growing and Sustaining Data Governance (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,352 Discovery Miles 23 520 Ships in 12 - 19 working days

While good data is an enterprise asset, bad data is an enterprise liability. Data governance enables you to effectively and proactively manage data assets throughout the enterprise by providing guidance in the form of policies, standards, processes and rules and defining roles and responsibilities outlining who will do what, with respect to data. While implementing data governance is not rocket science, it is not a simple exercise. There is a lot confusion around what data governance is, and a lot of challenges in the implementation of data governance. Data governance is not a project or a one-off exercise but a journey that involves a significant amount of effort, time and investment and cultural change and a number of factors to take into consideration to achieve and sustain data governance success. Data Governance Success: Growing and Sustaining Data Governance is the third and final book in the Data Governance series and discusses the following: * Data governance perceptions and challenges * Key considerations when implementing data governance to achieve and sustain success* Strategy and data governance* Different data governance maturity frameworks* Data governance - people and process elements* Data governance metrics This book shares the combined knowledge related to data and data governance that the author has gained over the years of working in different industrial and research programs and projects associated with data, processes, and technologies and unique perspectives of Thought Leaders and Data Experts through Interviews conducted. This book will be highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge to support and succeed in data governance implementations. This book is technology agnostic and contains a balance of concepts and examples and illustrations making it easy for the readers to understand and relate to their own specific data projects.

Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New): Richard Kirchner Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New)
Richard Kirchner
R2,087 R1,453 Discovery Miles 14 530 Save R634 (30%) Ships in 12 - 19 working days

"Surveillance and Threat Detection" offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of "Surveillance and Threat Detection" will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attackUnderstand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection programAccess a full ancillary package, including instructor's manual, test banks, and student study exams

Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,233 Discovery Miles 42 330 Ships in 12 - 19 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Amazon Transcribe Developer Guide (Hardcover): Documentation Team Amazon Transcribe Developer Guide (Hardcover)
Documentation Team
R950 Discovery Miles 9 500 Ships in 10 - 15 working days
Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback): Michael Cross Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback)
Michael Cross
R1,185 Discovery Miles 11 850 Ships in 12 - 19 working days

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security"

Sensemaking for Security (Hardcover, 1st ed. 2021): Anthony J. Masys Sensemaking for Security (Hardcover, 1st ed. 2021)
Anthony J. Masys
R4,244 Discovery Miles 42 440 Ships in 12 - 19 working days

This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.

Communications and Computer Networks (Hardcover): Akira Hanako Communications and Computer Networks (Hardcover)
Akira Hanako
R3,527 R3,189 Discovery Miles 31 890 Save R338 (10%) Ships in 10 - 15 working days
Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R648 Discovery Miles 6 480 Ships in 10 - 15 working days
Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New): Josh More Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New)
Josh More
R652 Discovery Miles 6 520 Ships in 12 - 19 working days

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. "

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in "Job Reconnaissance "is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave your current job to the departure of your current jobSuggests how to research new possible job opportunitiesShows how to target your new boss, controlling the job interview process and negotiating your new compensation "

Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up... Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up Multiple Streams of Passive Income Using Affiliate Marketing and More (Hardcover)
Matthew Shields
R744 R660 Discovery Miles 6 600 Save R84 (11%) Ships in 10 - 15 working days
AWS Elemental MediaLive User Guide (Hardcover): Documentation Team AWS Elemental MediaLive User Guide (Hardcover)
Documentation Team
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days
Social Theory After the Internet (Hardcover): Ralph Schroeder Social Theory After the Internet (Hardcover)
Ralph Schroeder
R1,190 Discovery Miles 11 900 Ships in 12 - 19 working days
Wireless Sensor Networks (Hardcover): Kevin Merriman Wireless Sensor Networks (Hardcover)
Kevin Merriman
R3,521 R3,183 Discovery Miles 31 830 Save R338 (10%) Ships in 10 - 15 working days
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New): Danda B. Rawat, Bhed... Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New)
Danda B. Rawat, Bhed B. Bista, Gongjun Yan
R5,477 Discovery Miles 54 770 Ships in 10 - 15 working days

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

SNMP Mastery (Hardcover): Michael W Lucas SNMP Mastery (Hardcover)
Michael W Lucas
R973 R878 Discovery Miles 8 780 Save R95 (10%) Ships in 10 - 15 working days
Big Data-Enabled Internet of Things (Hardcover): Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya Big Data-Enabled Internet of Things (Hardcover)
Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya
R3,852 R3,468 Discovery Miles 34 680 Save R384 (10%) Ships in 10 - 15 working days

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R656 Discovery Miles 6 560 Ships in 12 - 19 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Operational Auditing - Principles and Techniques for a Changing World (Paperback, 2nd ed.): Hernan Murdock Operational Auditing - Principles and Techniques for a Changing World (Paperback, 2nd ed.)
Hernan Murdock
R1,572 Discovery Miles 15 720 Ships in 12 - 19 working days
Research Anthology on Combating Denial-of-Service Attacks (Hardcover): Information Resources Management Association Research Anthology on Combating Denial-of-Service Attacks (Hardcover)
Information Resources Management Association
R10,795 Discovery Miles 107 950 Ships in 10 - 15 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback): Derrick Rountree Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback)
Derrick Rountree
R1,038 Discovery Miles 10 380 Ships in 12 - 19 working days

"Windows 2012 Server Network Security "provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting

Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. "Windows 2012 Server Network Security "provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
Provides practical examples of how to secure your Windows network. Focuses specifically on Windows network security rather than general concepts. One of the first books to cover WindowsServer 2012network security. "

Software Reuse in the Emerging Cloud Computing Era (Hardcover): Hongji Yang, Xiaodong Liu Software Reuse in the Emerging Cloud Computing Era (Hardcover)
Hongji Yang, Xiaodong Liu
R5,354 Discovery Miles 53 540 Ships in 10 - 15 working days

With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently emerged as a commercial reality. Software Reuse in the Emerging Cloud Computing Era targets a spectrum of readers, including researcher, practitioners, educators, and students and even part of the end users in software engineering, computing, networks and distributed systems, and information systems. The handbook will help to clarify the present fast-advancing literature of the current state of art and knowledge in the areas of the development and reuse of reusable assets in emerging software systems and applications, as part of the information science and technology literature. It will no doubt expand the above literature, and promote the exchange and evolution of the above advances in software reuse and cloud computing among multiple disciplines, and a wide spectrum of research, industry, and user communities.

AWS DeepLens Developer Guide (Hardcover): Documentation Team AWS DeepLens Developer Guide (Hardcover)
Documentation Team
R946 Discovery Miles 9 460 Ships in 10 - 15 working days
Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing (Hardcover): Sunil Kumar, Glenford Mapp,... Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing (Hardcover)
Sunil Kumar, Glenford Mapp, Korhan Cengiz
R3,512 R3,168 Discovery Miles 31 680 Save R344 (10%) Ships in 10 - 15 working days

As enterprise access networks evolve with a larger number of mobile users, a wide range of devices and new cloud-based applications, managing user performance on an end-to-end basis has become rather challenging. Recent advances in big data network analytics combined with AI and cloud computing are being leveraged to tackle this growing problem. AI is becoming further integrated with software that manage networks, storage, and can compute. This edited book focuses on how new network analytics, IoTs and Cloud Computing platforms are being used to ingest, analyse and correlate a myriad of big data across the entire network stack in order to increase quality of service and quality of experience (QoS/QoE) and to improve network performance. From big data and AI analytical techniques for handling the huge amount of data generated by IoT devices, the authors cover cloud storage optimization, the design of next generation access protocols and internet architecture, fault tolerance and reliability in intelligent networks, and discuss a range of emerging applications. This book will be useful to researchers, scientists, engineers, professionals, advanced students and faculty members in ICTs, data science, networking, AI, machine learning and sensing. It will also be of interest to professionals in data science, AI, cloud and IoT start-up companies, as well as developers and designers.

Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover): S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover)
S. Srinivasan
R5,345 Discovery Miles 53 450 Ships in 10 - 15 working days

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Know Them By Their Fruit - A Guide To…
A.T. Ankiewicz Paperback R698 Discovery Miles 6 980
Machine Learning - The Ultimate…
Mark Reed Hardcover R607 R551 Discovery Miles 5 510
Proceedings of the Mediterranean…
Ahmed El Oualkadi, Fethi Choubani, … Hardcover R5,792 Discovery Miles 57 920
Being Black - A South African Story That…
Theo Mayekiso Paperback R331 Discovery Miles 3 310
Coding for Kids in Python - Python…
Bob Mather Hardcover R917 Discovery Miles 9 170
Stellenbosch: Murder Town - Two Decades…
Julian Jansen Paperback R360 R337 Discovery Miles 3 370
Language Technologies for the Challenges…
Georg Rehm, Thierry Declerck Hardcover R1,612 Discovery Miles 16 120
The Fourth Industrial Revolution…
Allam Hamdan, Aboul Ella Hassanien, … Hardcover R5,174 Discovery Miles 51 740
Sol - My Friend And Adversary, Sol…
Peter Venison Paperback R350 R315 Discovery Miles 3 150
The Future of Creative Work - Creativity…
Greg Hearn Hardcover R3,488 Discovery Miles 34 880

 

Partners