0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (362)
  • R250 - R500 (936)
  • R500+ (14,130)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Networking, Models and Methods of Cloud Computing (Hardcover): Michel Levine Networking, Models and Methods of Cloud Computing (Hardcover)
Michel Levine
R3,128 Discovery Miles 31 280 Ships in 12 - 17 working days
Emerging Technologies in Data Mining and Information Security - Proceedings of IEMIS 2020, Volume 3 (Hardcover, 1st ed. 2021):... Emerging Technologies in Data Mining and Information Security - Proceedings of IEMIS 2020, Volume 3 (Hardcover, 1st ed. 2021)
Joao Manuel R.S. Tavares, Satyajit Chakrabarti, Abhishek Bhattacharya, Sujata Ghatak
R5,671 Discovery Miles 56 710 Ships in 10 - 15 working days

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.

Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence... Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence (Hardcover)
Judith Symonds, John Ayoade, Dave Parry
R5,139 Discovery Miles 51 390 Ships in 12 - 17 working days

There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.

Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 1 (Hardcover): Surjit Singh, Rajeev... Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 1 (Hardcover)
Surjit Singh, Rajeev Mohan Sharma
R6,751 Discovery Miles 67 510 Ships in 10 - 15 working days
Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover): Fouad Mohammed Abbou, Hiew Chee... Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover)
Fouad Mohammed Abbou, Hiew Chee Choong
R5,122 Discovery Miles 51 220 Ships in 12 - 17 working days

Data services, especially those involving multimedia applications, can often be bandwidth intensive and accessed simultaneously by a large number of users. As such, efforts are being made to replace conventional network infrastructure, based on copper lines and coaxial cables, with fiber optic networks for improved performance. Optical Transmission and Networks for Next Generation Internet Traffic Highways provides a broader perspective of the parameters involved in the transmission of optical signals using optical soliton systems, OCDM-WDM, SCM-WDM and OTDM-WDM. This timely publication is ideal for use by technical managers, graduate students, engineers and technicians involved in the fiber-optics industry, and scientists working in the field of optical communications.

Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management... Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management (Hardcover, New)
Alan Rea
R4,756 Discovery Miles 47 560 Ships in 12 - 17 working days

Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning, implementing, working within, and managing these promising virtual technologies for secure processes and initiatives. This publication discusses the uses and potential of these virtual technologies and examines secure policy formation and practices that can be applied specifically to each.

IT Security Governance Innovations - Theory and Research (Hardcover, New): Daniel Mellado, Luis Enrique Sanchez, Eduardo... IT Security Governance Innovations - Theory and Research (Hardcover, New)
Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini
R5,143 Discovery Miles 51 430 Ships in 12 - 17 working days

IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.

Developing and Evaluating Security-Aware Software Systems (Hardcover): Khaled M Khan Developing and Evaluating Security-Aware Software Systems (Hardcover)
Khaled M Khan
R5,142 Discovery Miles 51 420 Ships in 12 - 17 working days

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover): Mahmoud Eid Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover)
Mahmoud Eid
R5,147 Discovery Miles 51 470 Ships in 12 - 17 working days

Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R6,094 Discovery Miles 60 940 Ships in 10 - 15 working days
Sustainable Communication Networks and Application - Proceedings of ICSCN 2020 (Hardcover, 1st ed. 2021): P. Karuppusamy,... Sustainable Communication Networks and Application - Proceedings of ICSCN 2020 (Hardcover, 1st ed. 2021)
P. Karuppusamy, Isidoros Perikos, Fuqian Shi, Tu N. Nguyen
R5,578 Discovery Miles 55 780 Ships in 10 - 15 working days

This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.

Kali Linux Penetration Testing Bible (Paperback): G Khawaja Kali Linux Penetration Testing Bible (Paperback)
G Khawaja
R726 Discovery Miles 7 260 Ships in 12 - 17 working days

Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python

Amazon Simple Queue Service Developer Guide (Hardcover): Documentation Team Amazon Simple Queue Service Developer Guide (Hardcover)
Documentation Team
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days
Data Driven Approach Towards Disruptive Technologies - Proceedings of MIDAS 2020 (Hardcover, 1st ed. 2021): T.P. Singh, Ravi... Data Driven Approach Towards Disruptive Technologies - Proceedings of MIDAS 2020 (Hardcover, 1st ed. 2021)
T.P. Singh, Ravi Tomar, Tanupriya Choudhury, Thinagaran Perumal, Hussain Falih Mahdi
R8,146 Discovery Miles 81 460 Ships in 12 - 17 working days

This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India, during 4-5 September 2020. The book addresses the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like data-driven industrial IoT, bioinformatics, network and security, autonomous computing and various other aligned areas. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber-physical system and smart agriculture. All papers have been carefully reviewed. The book is of interest to computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.

Online Banking Security Measures and Data Protection (Hardcover): Shadi A. Aljawarneh Online Banking Security Measures and Data Protection (Hardcover)
Shadi A. Aljawarneh
R5,629 Discovery Miles 56 290 Ships in 12 - 17 working days

Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover)
Information R Management Association
R12,588 Discovery Miles 125 880 Ships in 10 - 15 working days
Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover): Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover)
R4,764 Discovery Miles 47 640 Ships in 12 - 17 working days

The increasing reliance upon networking and mobile networking devices in the modern world demands constant improvement of network Quality of Service (QoS). Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication explores the interrelated natures of network control mechanisms and QoS and offers fundamental knowledge on the subject, describing the significance of network management and the integration of knowledge to demonstrate how network management is related to QoS in real applications. Engaging and innovative, this book provides practical solutions that integrate network management and QoS strategies for real-world application.

Amazon Simple Email Service Developer Guide (Hardcover): Documentation Team Amazon Simple Email Service Developer Guide (Hardcover)
Documentation Team
R2,420 Discovery Miles 24 200 Ships in 10 - 15 working days
CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Wm.... CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Wm. Arthur Conklin, Daniel Shoemaker
R1,083 Discovery Miles 10 830 Ships in 12 - 17 working days

Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the exam CSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC) (R). Thoroughly revised and updated for the latest exam release, this guide includes real-world examples and comprehensive coverage on all aspects of application security within the entire software development lifecycle. It also includes hands-on exercises, chapter review summaries and notes, tips, and cautions that provide real-world insight and call out potentially harmful situations. With access to 350 exam questions online, you can practice either with full-length, timed mock exams or by creating your own custom quizzes by chapter or exam objective. CSSLP Certification All-in-One Exam Guide, Third Edition provides thorough coverage of all eight exam domains: Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation Programming Secure Software Testing Secure Lifecycle Management Software Deployment, Operations, and Maintenance Supply Chain and Software Acquisition

Digitalisation and Development - Issues for India and Beyond (Hardcover, 1st ed. 2020): Dibyendu Maiti, Fulvio Castellacci,... Digitalisation and Development - Issues for India and Beyond (Hardcover, 1st ed. 2020)
Dibyendu Maiti, Fulvio Castellacci, Arne Melchior
R1,665 Discovery Miles 16 650 Ships in 10 - 15 working days

This book investigates the impact of information and communication technologies (ICTs) on development and well-being (beyond economic benefits) and highlights some emerging issues relating to the realities, constraints and digital divides with particular reference to India. It collects a series of novel contributions, studying the Indian experience in an international cross-country perspective. The book also discusses economic, social, and behavioural aspects of well-being as well as access to ICTs across regions, states and individuals to account for the digital divide. The book establishes an aggregate relationship between ICT exposure and well-being at the country level and addresses a number of fundamental issues, such as whether ICT raises the level of transparency and governance. Based on case studies and anecdotal evidence, it then further assesses the effective implementation of service delivery through ICT innovations. The book is divided into four parts: The introductory part surveys the literature and presents background information on the Indian case; introduces the main themes on the relationships between ICT, socio-economic development and digital divides; and provides a summary and roadmap to the chapters of the book. Part II focuses on the impact of ICT on economic performance, including economic growth, productivity and trade. Part III examines the extent of the digital divides in India, including international, regional as well as inter-personal inequality. Finally, Part IV investigates the impact of ICT on governance, users' well-being and social outcomes. Combining insights from analyses of a variety of socio-economic dimensions related to digitalisation, this book is relevant for a wide range of scholars and researchers across disciplines, as well as practitioners and policy-makers. While the book has a main focus on India, various contributions take an international cross-country comparative perspective, and the results have general relevance for digitalisation and development. On the whole, the main message of this book is that the impact of ICTs is contingent upon other assets, capabilities and institutional conditions. National policies should, therefore, not only promote digitalization as such but also ensure its co-evolution and complementarity with a variety of other country-specific factors. Chapter 'Digitalisation and Development: Issues for India and Beyond' of this book is available open access under a CC BY 4.0 license at link.springer.com

Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New): Gianluca Cornetta, David J Santos,... Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New)
Gianluca Cornetta, David J Santos, Jose Manuel Vazquez
R5,140 Discovery Miles 51 400 Ships in 12 - 17 working days

Radio-frequency (RF) integrated circuits in CMOS technology are gaining increasing popularity in the commercial world, and CMOS technology has become the dominant technology for applications such as GPS receivers, GSM cellular transceivers, wireless LAN, and wireless short-range personal area networks based on IEEE 802.15.1 (Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the increasing interest in wireless technologies and the widespread of wireless communications has prompted an ever increasing demand for radio frequency transceivers. Wireless Radio-Frequency Standards and System Design: Advanced Techniques provides perspectives on radio-frequency circuit and systems design, covering recent topics and developments in the RF area. Exploring topics such as LNA linearization, behavioral modeling and co-simulation of analog and mixed-signal complex blocks for RF applications, integrated passive devices for RF-ICs and baseband design techniques and wireless standards, this is a comprehensive reference for students as well as practicing professionals.

The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R574 Discovery Miles 5 740 Ships in 12 - 17 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Introduction to Microelectromechanical (MEM) Microwave Systems (Hardcover): Hector J de los Santos Introduction to Microelectromechanical (MEM) Microwave Systems (Hardcover)
Hector J de los Santos
R3,333 Discovery Miles 33 330 Ships in 12 - 17 working days

Microelectromechanical sytems (MEMS) applications in RF and microwave electronics are revolutionizing wireless communications. This text provides a comprehensive explanation of the fabrication and fundamental physics of MEMS and their applications in electronic communication systems. The book integrates circuit fabrication technology, device design-oriented materials, mechanical and microwave considerations, and RF/microwave electronics to give engineers and managers a clear understanding of the potential and limitations of MEMS in electronic communications.

Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover): Wen-Chen Hu Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover)
Wen-Chen Hu
R5,172 Discovery Miles 51 720 Ships in 12 - 17 working days

Education and research in the field of electronic commerce technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Electronic Commerce Technologies: Contemporary Applications supplements course instruction and student research with quality articles focused on key issues concerning the technologies and applications of electronic commerce. Containing over 30 chapters from authors across the globe, these selected readings in areas such as e-marketing, IT business, and mobile commerce depict the most relevant and important areas of classroom discussion within the categories of fundamental concepts and theories; development and design methodologies; tools and technologies; application and utilization; critical issues; and emerging trends.

Design Science Research. Cases (Hardcover, 1st ed. 2020): Jan Vom Brocke, Alan Hevner, Alexander Maedche Design Science Research. Cases (Hardcover, 1st ed. 2020)
Jan Vom Brocke, Alan Hevner, Alexander Maedche
R3,954 Discovery Miles 39 540 Ships in 12 - 17 working days

Design Science Research is a powerful paradigm enabling researchers to make important contributions to society and industry. Simply stated, the goal of DSR is to generate knowledge on how to find innovative solutions to important problems in the form of models, methods, constructs and instantiations. Over the past 20 years, the design science research (DSR) paradigm has developed into an established paradigm in Information Systems Research and it is of strong uptake in many other disciplines, including Management Science and Computer Science. This book provides a collection of twelve DSR cases, presented by experienced researchers in the field. It offers readers access to real-world DSR studies, together with the authors' reflections on their research processes. These cases will support researchers who want to engage in DSR, and represent a valuable addition to existing introductions to DSR methods and processes. Readers will learn from the hands-on experiences of respected experts who have conducted extensive DSR in a range of application contexts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,212 R1,121 Discovery Miles 11 210
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners