0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,636)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback): Vinod Joseph,... Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,346 Discovery Miles 13 460 Ships in 10 - 15 working days

"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments.

This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture.

If you're a network designer or architect, a technical sales professional, or if you're pursuing technical certifications, you will benefit from "Network Convergence"'s fundamental information on this rapidly evolving technology.
Discusses architectural nuances and includes practical case studies for deploying the next-generation framework for each service type Explains data center and cloud computing interconnect schemes for building next-generation cloud infrastructures that support a new array of requirements Provides configuration schemes from leading vendors, including Cisco, Juniper and Alcatel

FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed): Laura P Taylor FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed)
Laura P Taylor
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. "

FISMA Compliance Handbook Second Edition, "also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Includes new information on cloud computing compliance from Laura Taylor, the federal government s technical lead for FedRAMP

Includes coverage for both corporate and government IT managers

Learn how to prepare for, perform, and document FISMA compliance projects

This book is used by various colleges and universities in information security and MBA curriculums. "

Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover):... Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover)
Amit Kumar Tyagi, Ajith Abraham, Farookh Khadeer Hussain, Arturas Kaklauskas, R. Jagadeesh Kannan
R3,881 R3,496 Discovery Miles 34 960 Save R385 (10%) Ships in 18 - 22 working days

Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, finance, insurance and retail. The next generation of automated applications will command machines to do tasks better and more efficiently. Both industry and academic researchers are looking at transforming applications using machine learning and deep learning to build better models and by taking advantage of the decentralized nature of Blockchain. But the advent of these new technologies also brings very high expectations to industries, organisations and users. The decrease of computing costs, the improvement of data integrity in Blockchain, and the verification of transactions using Machine Learning are becoming essential goals. This edited book covers the challenges, opportunities, innovations, new concepts and emerging trends related to the use of machine learning, Blockchain and Big Data analytics for IoTs. The book is aimed at a broad audience of ICTs, data science, machine learning and cybersecurity researchers interested in the integration of these disruptive technologies and their applications for IoTs.

Information Protection Playbook (Paperback): Greg Kane, Lorna Koppel Information Protection Playbook (Paperback)
Greg Kane, Lorna Koppel
R1,457 Discovery Miles 14 570 Ships in 10 - 15 working days

The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The "Information Protection Playbook" is a part of Elsevier s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book"

Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New):... Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New)
Michael T. Raggo, Chet Hosmer
R1,103 Discovery Miles 11 030 Ships in 10 - 15 working days

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. "Data Hiding "provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions fordata hiding"

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An... Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R432 Discovery Miles 4 320 Ships in 10 - 15 working days

"Linux Malware Incident Response" is a "first look" at the "Malware Forensics Field Guide for Linux Systems," exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

Developments in Wireless Network Prototyping, Design, and Deployment - Future Generations (Hardcover): Mohammad A. Matin Developments in Wireless Network Prototyping, Design, and Deployment - Future Generations (Hardcover)
Mohammad A. Matin
R4,825 Discovery Miles 48 250 Ships in 18 - 22 working days

Wireless networks have become essential for delivering content and knowledge in the information age. Ever-increasing demands are made on these infrastructures as more and more sophisticated knowledge is consumed worldwide. Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations highlights the current design issues in wireless networks, informing scholars and practitioners about advanced prototyping innovations in this field. This book will empower readers to make further advancements in networking and serves as a comprehensive reference for graduate students, scholars, and practitioners alike.

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R622 Discovery Miles 6 220 Ships in 10 - 15 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New): Josh More Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New)
Josh More
R608 Discovery Miles 6 080 Ships in 10 - 15 working days

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. "

Assessing Vendors "shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New): Danda B. Rawat, Bhed... Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New)
Danda B. Rawat, Bhed B. Bista, Gongjun Yan
R5,051 Discovery Miles 50 510 Ships in 18 - 22 working days

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

Mastering Cloud Computing - Foundations and Applications Programming (Paperback, New): Rajkumar Buyya, Christian Vecchiola, S.... Mastering Cloud Computing - Foundations and Applications Programming (Paperback, New)
Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi
R2,028 R1,773 Discovery Miles 17 730 Save R255 (13%) Ships in 10 - 15 working days

"Mastering Cloud Computing" is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems.

The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout.
Explains how to make design choices and tradeoffs to consider when building applications to run in a virtual cloud environmentReal-world case studies include scientific, business, and energy-efficiency considerations"

Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback): Derrick Rountree Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback)
Derrick Rountree
R981 Discovery Miles 9 810 Ships in 10 - 15 working days

"Windows 2012 Server Network Security "provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting

Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. "Windows 2012 Server Network Security "provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
Provides practical examples of how to secure your Windows network. Focuses specifically on Windows network security rather than general concepts. One of the first books to cover WindowsServer 2012network security. "

Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet... Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet (Hardcover)
N. K. McCarthy; Illustrated by Arthur King; Introduction by Abby Anderson
R469 Discovery Miles 4 690 Ships in 10 - 15 working days
Open Source Cloud Computing Systems - Practices and Paradigms (Hardcover): Luis M. Vaquero, Juan Caceres, Juan J. Hierro Open Source Cloud Computing Systems - Practices and Paradigms (Hardcover)
Luis M. Vaquero, Juan Caceres, Juan J. Hierro
R4,906 Discovery Miles 49 060 Ships in 18 - 22 working days

Cloud computing is a new paradigm devoted to the provision of every network resource available as a service to a variety of users. Open Source Cloud Computing Systems: Practices and Paradigms bridges the gap between solutions and users' needs. This book presents the most relevant open source cloud technologies available today. It offers a practical compendium of cloud technologies while also providing information on where to access these technologies, how to install them, and when it is appropriate to use one technology over another. For those deciding to start the endeavor of creating their own cloud, this book serves as a starting point for research on practical purposes and systems design.

Computation and Storage in the Cloud - Understanding the Trade-Offs (Paperback, New): Dong Yuan, Yun Yang, Jinjun Chen Computation and Storage in the Cloud - Understanding the Trade-Offs (Paperback, New)
Dong Yuan, Yun Yang, Jinjun Chen
R986 R856 Discovery Miles 8 560 Save R130 (13%) Ships in 10 - 15 working days

Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and usersDescribes several novel strategies for storing application datasets in the cloudIncludes real-world case studies of scientific research applications
Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users

Describes several novel strategies for storing application datasets in the cloud

Includes real-world case studies of scientific research applications

Digital Identity and Access Management - Technologies and Frameworks (Hardcover): Raj Sharman, Sanjukta Das Smith, Manish Gupta Digital Identity and Access Management - Technologies and Frameworks (Hardcover)
Raj Sharman, Sanjukta Das Smith, Manish Gupta
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of problems, as system managers are faced with major organizational, economic and market changes and are also expected to increase reach and ease of access to users across cyberspace while guaranteeing the reliability and privacy of highly sensitive data.

Software Reuse in the Emerging Cloud Computing Era (Hardcover): Hongji Yang, Xiaodong Liu Software Reuse in the Emerging Cloud Computing Era (Hardcover)
Hongji Yang, Xiaodong Liu
R4,938 Discovery Miles 49 380 Ships in 18 - 22 working days

With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently emerged as a commercial reality. Software Reuse in the Emerging Cloud Computing Era targets a spectrum of readers, including researcher, practitioners, educators, and students and even part of the end users in software engineering, computing, networks and distributed systems, and information systems. The handbook will help to clarify the present fast-advancing literature of the current state of art and knowledge in the areas of the development and reuse of reusable assets in emerging software systems and applications, as part of the information science and technology literature. It will no doubt expand the above literature, and promote the exchange and evolution of the above advances in software reuse and cloud computing among multiple disciplines, and a wide spectrum of research, industry, and user communities.

Amazon API Gateway Developer Guide (Hardcover): Documentation Team Amazon API Gateway Developer Guide (Hardcover)
Documentation Team
R2,818 Discovery Miles 28 180 Ships in 18 - 22 working days
Interop - The Promise and Perils of Highly Interconnected Systems (Hardcover): John Palfrey, Urs Gasser Interop - The Promise and Perils of Highly Interconnected Systems (Hardcover)
John Palfrey, Urs Gasser
R1,107 Discovery Miles 11 070 Ships in 18 - 22 working days

In Interop , technology experts John Palfrey and Urs Gasser explore the immense importance of interoperability,the standardization and integration of technology,and show how this simple principle will hold the key to our success in the coming decades and beyond. The practice of standardization has been facilitating innovation and economic growth for centuries. The standardization of the railroad gauge revolutionized the flow of commodities, the standardization of money revolutionized debt markets and simplified trade, and the standardization of credit networks has allowed for the purchase of goods using money deposited in a bank half a world away. These advancements did not eradicate the different systems they affected instead, each system has been transformed so that it can interoperate with systems all over the world, while still preserving local diversity. As Palfrey and Gasser show, interoperability is a critical aspect of any successful system,and now it is more important than ever. Today we are confronted with challenges that affect us on a global scale: the financial crisis, the quest for sustainable energy, and the need to reform health care systems and improve global disaster response systems. The successful flow of information across systems is crucial if we are to solve these problems, but we must also learn to manage the vast degree of interconnection inherent in each system involved. Interoperability offers a number of solutions to these global challenges, but Palfrey and Gasser also consider its potential negative effects, especially with respect to privacy, security, and co-dependence of states indeed, interoperability has already sparked debates about document data formats, digital music, and how to create successful yet safe cloud computing. Interop demonstrates that, in order to get the most out of interoperability while minimizing its risks, we will need to fundamentally revisit our understanding of how it works, and how it can allow for improvements in each of its constituent parts. In Interop , Palfrey and Gasser argue that there needs to be a nuanced, stable theory of interoperability,one that still generates efficiencies, but which also ensures a sustainable mode of interconnection. Pointing the way forward for the new information economy, Interop provides valuable insights into how technological integration and innovation can flourish in the twenty-first century.

Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,325 Discovery Miles 103 250 Ships in 18 - 22 working days
Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover): S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover)
S. Srinivasan
R4,930 Discovery Miles 49 300 Ships in 18 - 22 working days

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Advanced Research on Cloud Computing Design and Applications (Hardcover): Shadi Aljawarneh Advanced Research on Cloud Computing Design and Applications (Hardcover)
Shadi Aljawarneh
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

Modern society requires a specialized, persistent approach to IT service delivery. Cloud computing offers the most logical answer through a highly dynamic and virtualized resource made available by an increasing number of service providers. Advanced Research on Cloud Computing Design and Applications shares the latest high quality research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. This book is an essential reference source for researchers and practitioners in the field of cloud computing, as well as a guide for students, academics, or anyone seeking to learn more about advancement in IT services. This publication features chapters covering a broad range of relevant topics, including cloud computing for e-government, cloud computing in the public sector, security in the cloud, hybrid clouds and outsourced data, IT service personalization, and supply chain in the cloud.

Broadband Wireless Access Networks for 4G - Theory, Application, and Experimentation (Hardcover): Raul Aquino Santos, Victor... Broadband Wireless Access Networks for 4G - Theory, Application, and Experimentation (Hardcover)
Raul Aquino Santos, Victor Rangel Licea, Arthur Edwards Block
R5,954 Discovery Miles 59 540 Ships in 18 - 22 working days

With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of wideband and broadband wireless networks. Students, professors, researchers, and other professionals in the field will benefit from this book s practical applications and relevant studies."

Network Security Technologies - Design and Applications (Hardcover): Abdelmalek Amine, Otmane Ait Mohamed, Boualem Benatallah Network Security Technologies - Design and Applications (Hardcover)
Abdelmalek Amine, Otmane Ait Mohamed, Boualem Benatallah
R4,837 Discovery Miles 48 370 Ships in 18 - 22 working days

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Privacy by Design for the Internet of Things - Building accountability and security (Hardcover): Andrew Crabtree, Hamed... Privacy by Design for the Internet of Things - Building accountability and security (Hardcover)
Andrew Crabtree, Hamed Haddadi, Richard Mortier
R3,101 R2,804 Discovery Miles 28 040 Save R297 (10%) Ships in 18 - 22 working days

Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers and socials scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130

 

Partners