0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,596)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

AWS Data Pipeline Developer Guide (Hardcover): Documentation Team AWS Data Pipeline Developer Guide (Hardcover)
Documentation Team
R2,215 Discovery Miles 22 150 Ships in 18 - 22 working days
Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,356 Discovery Miles 103 560 Ships in 18 - 22 working days
AIoT Technologies and Applications for Smart Environments (Hardcover): Mamoun Alazab, Meenu Gupta, Shakeel Ahmed AIoT Technologies and Applications for Smart Environments (Hardcover)
Mamoun Alazab, Meenu Gupta, Shakeel Ahmed
R3,115 R2,817 Discovery Miles 28 170 Save R298 (10%) Ships in 18 - 22 working days

Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.

Evolution of Cognitive Networks and Self-Adaptive Communication Systems (Hardcover, New): Thomas D Lagkas, Panagiotis... Evolution of Cognitive Networks and Self-Adaptive Communication Systems (Hardcover, New)
Thomas D Lagkas, Panagiotis Sarigiannidis, Malamati Louta, Periklis Chatzimisios
R4,976 Discovery Miles 49 760 Ships in 18 - 22 working days

Cognitive networks can be crucial for the evolution of future communication systems; however, current trends have indicated major movement in other relevant fields towards the integration of different techniques for the realization of self-aware and self-adaptive communication systems. Evolution of Cognitive Networks and Self-Adaptive Communication Systems overviews innovative technologies combined for the formation of self-aware, self-adaptive, and self-organizing networks. By aiming to inform the research community and the related industry of solutions for cognitive networks, this book is essential for researchers, instructors, and professionals interested in clarifying the latest trends resulting in a unified realization for cognitive networking and communication systems.

Trust Management and Information Security (Hardcover): Stephen Mason Trust Management and Information Security (Hardcover)
Stephen Mason
R3,286 R2,976 Discovery Miles 29 760 Save R310 (9%) Ships in 18 - 22 working days
Big Data-Enabled Internet of Things (Hardcover): Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya Big Data-Enabled Internet of Things (Hardcover)
Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya
R3,548 R3,200 Discovery Miles 32 000 Save R348 (10%) Ships in 18 - 22 working days

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.

Handbook of Research on Threat Detection and Countermeasures in Network Security (Hardcover): Alaa Hussein Al-Hamami, Ghossoon... Handbook of Research on Threat Detection and Countermeasures in Network Security (Hardcover)
Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
R8,094 Discovery Miles 80 940 Ships in 18 - 22 working days

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Simulation in Computer Network Design and Modeling - Use and Analysis (Hardcover, New): Hussein Al-Bahadili Simulation in Computer Network Design and Modeling - Use and Analysis (Hardcover, New)
Hussein Al-Bahadili
R4,915 Discovery Miles 49 150 Ships in 18 - 22 working days

Computer networks have become essential to the survival of businesses, organizations, and educational institutions, as the number of network users, services, and applications has increased alongside advancements in information technology. Given this, efforts have been put forward by researchers, designers, managers, analysts, and professionals to optimize network performance and satisfy the varied groups that have an interest in network design and implementation. Simulation in Computer Network Design and Modeling: Use and Analysis reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation. This reference will inform the work and research of academics, post-graduate students, developers, network designers, network analysts, telecommunication system designers, and others who are interested in using simulation in computer network design and modeling.

AWS Key Management Service Developer Guide (Hardcover): Documentation Team AWS Key Management Service Developer Guide (Hardcover)
Documentation Team
R1,666 Discovery Miles 16 660 Ships in 18 - 22 working days
Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,327 Discovery Miles 103 270 Ships in 18 - 22 working days
Non-Functional Properties in Service Oriented Architecture - Requirements, Models and Methods (Hardcover, New): Nikola Milanovic Non-Functional Properties in Service Oriented Architecture - Requirements, Models and Methods (Hardcover, New)
Nikola Milanovic
R4,612 Discovery Miles 46 120 Ships in 18 - 22 working days

Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to the use of non-functional properties in SOA: requirements specification with respect to non-functional properties, modeling non-functional properties and implementation of non-functional properties. This book serves as both a practical reference and an advanced scientific source for those interested in current issues, new trends, and yet-unresolved areas of the discipline.

Temporal QOS Management in Scientific Cloud Workflow Systems (Paperback, New): Xiao Liu, Jinjun Chen, Yun Yang Temporal QOS Management in Scientific Cloud Workflow Systems (Paperback, New)
Xiao Liu, Jinjun Chen, Yun Yang
R958 Discovery Miles 9 580 Ships in 10 - 15 working days

Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures.

"Temporal QOS Management in Scientific Cloud Workflow Systems" focuses on real world scientific applications which often must be completed by satisfying a set of temporal constraints such as milestones and deadlines. Meanwhile, activity duration, as a measurement of system performance, often needs to be monitored and controlled. This book demonstrates how to guarantee on-time completion of most, if not all, workflow applications. Offering a comprehensive framework to support the lifecycle of time-constrained workflow applications, this book will enhance the overall performance and usability of scientific cloud workflow systems.
Explains how to reduce the cost to detect and handle temporal violations while delivering high quality of service (QoS) Offers new concepts, innovative strategies and algorithms to support large-scale sophisticatedapplications in the cloud Improves the overall performance and usability of cloud workflow systems"

Amazon EMR Release Guide (Hardcover): Documentation Team Amazon EMR Release Guide (Hardcover)
Documentation Team
R2,868 Discovery Miles 28 680 Ships in 18 - 22 working days
Engineering Reliable Service Oriented Architecture - Managing Complexity and Service Level Agreements (Hardcover): Nikola... Engineering Reliable Service Oriented Architecture - Managing Complexity and Service Level Agreements (Hardcover)
Nikola Milanovic
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

Dynamic, trustworthy and reliable service delivery in Service Oriented Architectures (SOA) is one of the main preconditions for successful and sustainable business operations. Service and business process reliability is, therefore, of paramount importance and cannot be compromised. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements presents a guide to engineering reliable SOA systems and enhances current understanding of service reliability. It is an essential reference for both practitioners and researchers wishing to explore state-of-the art results from the field of reliable SOA application engineering.

Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R5,529 Discovery Miles 55 290 Ships in 18 - 22 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

HCI Challenges and Privacy Preservation in Big Data Security (Hardcover): Daphne Lopez, M.A. Saleem Durai HCI Challenges and Privacy Preservation in Big Data Security (Hardcover)
Daphne Lopez, M.A. Saleem Durai
R5,287 Discovery Miles 52 870 Ships in 18 - 22 working days

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications (Hardcover, New): Joel J. P.... Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications (Hardcover, New)
Joel J. P. Rodrigues, Kai Lin, Jaime Lloret
R4,611 Discovery Miles 46 110 Ships in 18 - 22 working days

Recent technology trends involving the combination of mobile networks and cloud computing have offered new chances for mobile network providers to use specific carrier-cloud services. These advancements will enhance the utilization of the mobile cloud in industry and corporate settings. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications is a fundamental source for the advancement of knowledge, application, and practice in the interdisciplinary areas of mobile network and cloud computing. By addressing innovative concepts and critical issues, this book is essential for researchers, practitioners, and students interested in the emerging field of vehicular wireless networks.

Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet... Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet (Hardcover)
N. K. McCarthy; Illustrated by Arthur King; Introduction by Abby Anderson
R469 Discovery Miles 4 690 Ships in 10 - 15 working days
Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New): Pedro... Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New)
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Tieyan Li
R4,805 Discovery Miles 48 050 Ships in 18 - 22 working days

Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.

Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover): Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover)
R4,573 Discovery Miles 45 730 Ships in 18 - 22 working days

About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).

Dynamic Spectrum Management (Hardcover): Ying-Chang Liang Dynamic Spectrum Management (Hardcover)
Ying-Chang Liang
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days
Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover): Francesco Flammini Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover)
Francesco Flammini
R5,159 Discovery Miles 51 590 Ships in 10 - 15 working days

This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software

AWS Storage Gateway User Guide (Hardcover): Documentation Team AWS Storage Gateway User Guide (Hardcover)
Documentation Team
R1,489 Discovery Miles 14 890 Ships in 18 - 22 working days
State of the Art Virtual Reality and Augmented Reality Knowhow (Hardcover): Nawaz Mohamudally State of the Art Virtual Reality and Augmented Reality Knowhow (Hardcover)
Nawaz Mohamudally
R3,066 Discovery Miles 30 660 Ships in 18 - 22 working days
Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover): G. Nagarajan, R I Minu Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover)
G. Nagarajan, R I Minu
R7,006 Discovery Miles 70 060 Ships in 18 - 22 working days

Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690

 

Partners