0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (250)
  • R250 - R500 (864)
  • R500+ (13,635)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cyber Security Meets National Security - International Perspectives on Digital Era Threats (Hardcover): Neil Kent, Irina du... Cyber Security Meets National Security - International Perspectives on Digital Era Threats (Hardcover)
Neil Kent, Irina du Quenoy
R3,461 Discovery Miles 34 610 Ships in 18 - 22 working days

Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.

Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R656 R585 Discovery Miles 5 850 Save R71 (11%) Ships in 18 - 22 working days
Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover):... Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover)
Amit Kumar Tyagi, Ajith Abraham, Farookh Khadeer Hussain, Arturas Kaklauskas, R. Jagadeesh Kannan
R3,881 R3,496 Discovery Miles 34 960 Save R385 (10%) Ships in 18 - 22 working days

Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, finance, insurance and retail. The next generation of automated applications will command machines to do tasks better and more efficiently. Both industry and academic researchers are looking at transforming applications using machine learning and deep learning to build better models and by taking advantage of the decentralized nature of Blockchain. But the advent of these new technologies also brings very high expectations to industries, organisations and users. The decrease of computing costs, the improvement of data integrity in Blockchain, and the verification of transactions using Machine Learning are becoming essential goals. This edited book covers the challenges, opportunities, innovations, new concepts and emerging trends related to the use of machine learning, Blockchain and Big Data analytics for IoTs. The book is aimed at a broad audience of ICTs, data science, machine learning and cybersecurity researchers interested in the integration of these disruptive technologies and their applications for IoTs.

Trust Management and Information Security (Hardcover): Stephen Mason Trust Management and Information Security (Hardcover)
Stephen Mason
R3,286 R2,976 Discovery Miles 29 760 Save R310 (9%) Ships in 18 - 22 working days
Handbook of Research on Threat Detection and Countermeasures in Network Security (Hardcover): Alaa Hussein Al-Hamami, Ghossoon... Handbook of Research on Threat Detection and Countermeasures in Network Security (Hardcover)
Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
R8,094 Discovery Miles 80 940 Ships in 18 - 22 working days

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

AIoT Technologies and Applications for Smart Environments (Hardcover): Mamoun Alazab, Meenu Gupta, Shakeel Ahmed AIoT Technologies and Applications for Smart Environments (Hardcover)
Mamoun Alazab, Meenu Gupta, Shakeel Ahmed
R3,115 R2,817 Discovery Miles 28 170 Save R298 (10%) Ships in 18 - 22 working days

Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.

Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (Hardcover): Romil Rawat, Vinod Mahor, Shrikant... Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (Hardcover)
Romil Rawat, Vinod Mahor, Shrikant Telang; Kiran Pachlasiya
R6,208 Discovery Miles 62 080 Ships in 18 - 22 working days

Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.

AWS Key Management Service Developer Guide (Hardcover): Documentation Team AWS Key Management Service Developer Guide (Hardcover)
Documentation Team
R1,666 Discovery Miles 16 660 Ships in 18 - 22 working days
Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Paperback): Rajesh Jugulum Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Paperback)
Rajesh Jugulum
R912 Discovery Miles 9 120 Ships in 10 - 15 working days

Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.

Weaponizing Cyberspace - Inside Russia's Hostile Activities (Hardcover): Nicholas Michael Sambaluk Weaponizing Cyberspace - Inside Russia's Hostile Activities (Hardcover)
Nicholas Michael Sambaluk
R2,369 Discovery Miles 23 690 Ships in 10 - 15 working days

The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed. Explains how the legacy of Soviet information operations and the modern examples of Russian information operations are similar but not identical to one another Explores the development of Russian domestic information operations techniques that can now be applied against foreign powers Describes the relationships between technical attacks and disinformation often used in confrontations with countries along Russia's borders Examines the role of Russian information operations in U.S. social and political discourse Considers the implications of other countries' reactions that attempt to eliminate the Russian information operation's ability to influence society

Non-Functional Properties in Service Oriented Architecture - Requirements, Models and Methods (Hardcover, New): Nikola Milanovic Non-Functional Properties in Service Oriented Architecture - Requirements, Models and Methods (Hardcover, New)
Nikola Milanovic
R4,612 Discovery Miles 46 120 Ships in 18 - 22 working days

Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to the use of non-functional properties in SOA: requirements specification with respect to non-functional properties, modeling non-functional properties and implementation of non-functional properties. This book serves as both a practical reference and an advanced scientific source for those interested in current issues, new trends, and yet-unresolved areas of the discipline.

Broadband Wireless Access Networks for 4G - Theory, Application, and Experimentation (Hardcover): Raul Aquino Santos, Victor... Broadband Wireless Access Networks for 4G - Theory, Application, and Experimentation (Hardcover)
Raul Aquino Santos, Victor Rangel Licea, Arthur Edwards Block
R5,954 Discovery Miles 59 540 Ships in 18 - 22 working days

With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of wideband and broadband wireless networks. Students, professors, researchers, and other professionals in the field will benefit from this book s practical applications and relevant studies."

Amazon API Gateway Developer Guide (Hardcover): Documentation Team Amazon API Gateway Developer Guide (Hardcover)
Documentation Team
R2,818 Discovery Miles 28 180 Ships in 18 - 22 working days
Temporal QOS Management in Scientific Cloud Workflow Systems (Paperback, New): Xiao Liu, Jinjun Chen, Yun Yang Temporal QOS Management in Scientific Cloud Workflow Systems (Paperback, New)
Xiao Liu, Jinjun Chen, Yun Yang
R958 Discovery Miles 9 580 Ships in 10 - 15 working days

Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures.

"Temporal QOS Management in Scientific Cloud Workflow Systems" focuses on real world scientific applications which often must be completed by satisfying a set of temporal constraints such as milestones and deadlines. Meanwhile, activity duration, as a measurement of system performance, often needs to be monitored and controlled. This book demonstrates how to guarantee on-time completion of most, if not all, workflow applications. Offering a comprehensive framework to support the lifecycle of time-constrained workflow applications, this book will enhance the overall performance and usability of scientific cloud workflow systems.
Explains how to reduce the cost to detect and handle temporal violations while delivering high quality of service (QoS) Offers new concepts, innovative strategies and algorithms to support large-scale sophisticatedapplications in the cloud Improves the overall performance and usability of cloud workflow systems"

Amazon EMR Release Guide (Hardcover): Documentation Team Amazon EMR Release Guide (Hardcover)
Documentation Team
R2,868 Discovery Miles 28 680 Ships in 18 - 22 working days
Engineering Reliable Service Oriented Architecture - Managing Complexity and Service Level Agreements (Hardcover): Nikola... Engineering Reliable Service Oriented Architecture - Managing Complexity and Service Level Agreements (Hardcover)
Nikola Milanovic
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

Dynamic, trustworthy and reliable service delivery in Service Oriented Architectures (SOA) is one of the main preconditions for successful and sustainable business operations. Service and business process reliability is, therefore, of paramount importance and cannot be compromised. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements presents a guide to engineering reliable SOA systems and enhances current understanding of service reliability. It is an essential reference for both practitioners and researchers wishing to explore state-of-the art results from the field of reliable SOA application engineering.

AWS Data Pipeline Developer Guide (Hardcover): Documentation Team AWS Data Pipeline Developer Guide (Hardcover)
Documentation Team
R2,215 Discovery Miles 22 150 Ships in 18 - 22 working days
HCI Challenges and Privacy Preservation in Big Data Security (Hardcover): Daphne Lopez, M.A. Saleem Durai HCI Challenges and Privacy Preservation in Big Data Security (Hardcover)
Daphne Lopez, M.A. Saleem Durai
R5,287 Discovery Miles 52 870 Ships in 18 - 22 working days

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Evolution of Cognitive Networks and Self-Adaptive Communication Systems (Hardcover, New): Thomas D Lagkas, Panagiotis... Evolution of Cognitive Networks and Self-Adaptive Communication Systems (Hardcover, New)
Thomas D Lagkas, Panagiotis Sarigiannidis, Malamati Louta, Periklis Chatzimisios
R4,976 Discovery Miles 49 760 Ships in 18 - 22 working days

Cognitive networks can be crucial for the evolution of future communication systems; however, current trends have indicated major movement in other relevant fields towards the integration of different techniques for the realization of self-aware and self-adaptive communication systems. Evolution of Cognitive Networks and Self-Adaptive Communication Systems overviews innovative technologies combined for the formation of self-aware, self-adaptive, and self-organizing networks. By aiming to inform the research community and the related industry of solutions for cognitive networks, this book is essential for researchers, instructors, and professionals interested in clarifying the latest trends resulting in a unified realization for cognitive networking and communication systems.

Principles and Applications of Distributed Event-Based Systems (Hardcover, New): Principles and Applications of Distributed Event-Based Systems (Hardcover, New)
R4,659 Discovery Miles 46 590 Ships in 18 - 22 working days

Recently, the event-based paradigm, a burgeoning technology receiving attention in research as well as industry, has gained momentum in the commercial world causing a need for further research in the field. Principles and Applications of Distributed Event-Based Systems showcases event-based systems in real-world applications, providing an overview of relevant terminology and content approachable for readers from a variety of backgrounds. Containing expert international contributions, this advanced publication provides professionals, researchers, and students in systems design with a rich compendium of latest applications in the field.

Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet... Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet (Hardcover)
N. K. McCarthy; Illustrated by Arthur King; Introduction by Abby Anderson
R469 Discovery Miles 4 690 Ships in 10 - 15 working days
Privacy by Design for the Internet of Things - Building accountability and security (Hardcover): Andrew Crabtree, Hamed... Privacy by Design for the Internet of Things - Building accountability and security (Hardcover)
Andrew Crabtree, Hamed Haddadi, Richard Mortier
R3,101 R2,804 Discovery Miles 28 040 Save R297 (10%) Ships in 18 - 22 working days

Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers and socials scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.

Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New): Pedro... Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New)
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Tieyan Li
R4,805 Discovery Miles 48 050 Ships in 18 - 22 working days

Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.

Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover): Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover)
R4,573 Discovery Miles 45 730 Ships in 18 - 22 working days

About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).

Dynamic Spectrum Management (Hardcover): Ying-Chang Liang Dynamic Spectrum Management (Hardcover)
Ying-Chang Liang
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Explore It!
Elisabeth Hendrickson Paperback R649 R599 Discovery Miles 5 990
Virtual and Augmented Reality…
Information Reso Management Association Hardcover R9,445 Discovery Miles 94 450
The Arts and Crafts of Older Spain…
Leonard Williams Paperback R606 Discovery Miles 6 060
Change Management for Beginners…
Steffen Lobinger Hardcover R526 Discovery Miles 5 260
Essential Java for Scientists and…
Brian Hahn, Katherine Malan Paperback R1,266 Discovery Miles 12 660
Computer Aided Software Engineering
Hausi A. Muller, Ronald J. Norman, … Hardcover R5,253 Discovery Miles 52 530
14 Habits of Highly Productive…
Zeno Rocha Hardcover R457 R427 Discovery Miles 4 270
A Treatise on Diamonds, and Precious…
John Mawe Paperback R459 Discovery Miles 4 590
The History of Painting in Italy - from…
Luigi Lanzi Paperback R639 Discovery Miles 6 390
Elements of Art, a Poem - in Six Cantos…
Martin Archer Shee Paperback R606 Discovery Miles 6 060

 

Partners