0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New): Josh More Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New)
Josh More
R642 Discovery Miles 6 420 Ships in 12 - 19 working days

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. "

Assessing Vendors "shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

Developments in Wireless Network Prototyping, Design, and Deployment - Future Generations (Hardcover): Mohammad A. Matin Developments in Wireless Network Prototyping, Design, and Deployment - Future Generations (Hardcover)
Mohammad A. Matin
R5,231 Discovery Miles 52 310 Ships in 10 - 15 working days

Wireless networks have become essential for delivering content and knowledge in the information age. Ever-increasing demands are made on these infrastructures as more and more sophisticated knowledge is consumed worldwide. Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations highlights the current design issues in wireless networks, informing scholars and practitioners about advanced prototyping innovations in this field. This book will empower readers to make further advancements in networking and serves as a comprehensive reference for graduate students, scholars, and practitioners alike.

Open Source Cloud Computing Systems - Practices and Paradigms (Hardcover): Luis M. Vaquero, Juan Caceres, Juan J. Hierro Open Source Cloud Computing Systems - Practices and Paradigms (Hardcover)
Luis M. Vaquero, Juan Caceres, Juan J. Hierro
R5,319 Discovery Miles 53 190 Ships in 10 - 15 working days

Cloud computing is a new paradigm devoted to the provision of every network resource available as a service to a variety of users. Open Source Cloud Computing Systems: Practices and Paradigms bridges the gap between solutions and users' needs. This book presents the most relevant open source cloud technologies available today. It offers a practical compendium of cloud technologies while also providing information on where to access these technologies, how to install them, and when it is appropriate to use one technology over another. For those deciding to start the endeavor of creating their own cloud, this book serves as a starting point for research on practical purposes and systems design.

Cyber Warfare - How Conflicts in Cyberspace Are Challenging America and Changing the World (Hardcover): Paul Rosenzweig Cyber Warfare - How Conflicts in Cyberspace Are Challenging America and Changing the World (Hardcover)
Paul Rosenzweig
R1,928 Discovery Miles 19 280 Ships in 10 - 15 working days

This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem. In Part I, the author describes the nature of cyber threats, including the threat of cyber warfare. Part II describes the policies and practices currently in place, while Part III proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.

Java Card E-Payment Application Development (Hardcover): Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller Java Card E-Payment Application Development (Hardcover)
Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

Java Card is one of the latest developments in the area of multi-application and platform-independent smart cards. As a working tool for professionals, this easy-to-understand resource provides clear, detailed guidance on smart cards, credit and debit cards, Java Card and Open Card Framework (OCF). It offers in-depth coverage of important standards, open specifications and critical security issues, including common threats and security mechanisms regarding the card and its connection interface. The book explains how to program a Java Card applet, an OCF card service and a terminal application. What's more, the book presents an informative case study on the credit-debit application, offering a detailed road map of the application development process.

Network Security Technologies - Design and Applications (Hardcover): Abdelmalek Amine, Otmane Ait Mohamed, Boualem Benatallah Network Security Technologies - Design and Applications (Hardcover)
Abdelmalek Amine, Otmane Ait Mohamed, Boualem Benatallah
R5,244 Discovery Miles 52 440 Ships in 10 - 15 working days

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An... Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R459 Discovery Miles 4 590 Ships in 12 - 19 working days

"Linux Malware Incident Response" is a "first look" at the "Malware Forensics Field Guide for Linux Systems," exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

The Networknomicon, or SNMP Mastery (Hardcover): Michael W Lucas, Abdul Alhazred The Networknomicon, or SNMP Mastery (Hardcover)
Michael W Lucas, Abdul Alhazred
R1,559 R1,347 Discovery Miles 13 470 Save R212 (14%) Ships in 10 - 15 working days
Security Issues and Privacy Threats in Smart Ubiquitous Computing (Hardcover, 1st ed. 2021): Parikshit N. Mahalle, Gitanjali R.... Security Issues and Privacy Threats in Smart Ubiquitous Computing (Hardcover, 1st ed. 2021)
Parikshit N. Mahalle, Gitanjali R. Shinde, Nilanjan Dey, Aboul Ella Hassanien
R5,110 Discovery Miles 51 100 Ships in 10 - 15 working days

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

Data Mining and Analysis in the Engineering Field (Hardcover): Vishal Bhatnagar Data Mining and Analysis in the Engineering Field (Hardcover)
Vishal Bhatnagar
R6,171 Discovery Miles 61 710 Ships in 10 - 15 working days

Particularly in the fields of software engineering, virtual reality, and computer science, data mining techniques play a critical role in the success of a variety of projects and endeavors. Understanding the available tools and emerging trends in this field is an important consideration for any organization. Data Mining and Analysis in the Engineering Field explores current research in data mining, including the important trends and patterns and their impact in fields such as software engineering. With a focus on modern techniques as well as past experiences, this vital reference work will be of greatest use to engineers, researchers, and practitioners in scientific-, engineering-, and business-related fields.

Computation and Storage in the Cloud - Understanding the Trade-Offs (Paperback, New): Dong Yuan, Yun Yang, Jinjun Chen Computation and Storage in the Cloud - Understanding the Trade-Offs (Paperback, New)
Dong Yuan, Yun Yang, Jinjun Chen
R1,049 R905 Discovery Miles 9 050 Save R144 (14%) Ships in 12 - 19 working days

Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and usersDescribes several novel strategies for storing application datasets in the cloudIncludes real-world case studies of scientific research applications
Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users

Describes several novel strategies for storing application datasets in the cloud

Includes real-world case studies of scientific research applications

Data Science for Fake News - Surveys and Perspectives (Hardcover, 1st ed. 2021): Deepak P, Tanmoy Chakraborty, Cheng Long,... Data Science for Fake News - Surveys and Perspectives (Hardcover, 1st ed. 2021)
Deepak P, Tanmoy Chakraborty, Cheng Long, Santhosh Kumar G
R4,591 Discovery Miles 45 910 Ships in 12 - 19 working days

This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines. The approach is based on the idea that advancing the frontier on data science approaches for fake news is an interdisciplinary effort, and that perspectives from domain experts are crucial to shape the next generation of methods and tools. The fake news challenge cuts across a number of data science subfields such as graph analytics, mining of spatio-temporal data, information retrieval, natural language processing, computer vision and image processing, to name a few. This book will present a number of tutorial-style surveys that summarize a range of recent work in the field. In a unique feature, this book includes perspective notes from experts in disciplines such as linguistics, anthropology, medicine and politics that will help to shape the next generation of data science research in fake news. The main target groups of this book are academic and industrial researchers working in the area of data science, and with interests in devising and applying data science technologies for fake news detection. For young researchers such as PhD students, a review of data science work on fake news is provided, equipping them with enough know-how to start engaging in research within the area. For experienced researchers, the detailed descriptions of approaches will enable them to take seasoned choices in identifying promising directions for future research.

Artificial Intelligence in China - Proceedings of the 2nd International Conference on Artificial Intelligence in China... Artificial Intelligence in China - Proceedings of the 2nd International Conference on Artificial Intelligence in China (Hardcover, 1st ed. 2021)
Qilian Liang, Wei Wang, Jiasong Mu, Xin Liu, Zhenyu Na, …
R4,473 Discovery Miles 44 730 Ships in 10 - 15 working days

This book brings together papers presented at The 2nd International Conference on Artificial Intelligence in China (ChinaAI) 2020, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics covering all topics in artificial intelligence with new development in China, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).

Interop - The Promise and Perils of Highly Interconnected Systems (Hardcover): John Palfrey, Urs Gasser Interop - The Promise and Perils of Highly Interconnected Systems (Hardcover)
John Palfrey, Urs Gasser
R1,195 Discovery Miles 11 950 Ships in 10 - 15 working days

In Interop , technology experts John Palfrey and Urs Gasser explore the immense importance of interoperability,the standardization and integration of technology,and show how this simple principle will hold the key to our success in the coming decades and beyond. The practice of standardization has been facilitating innovation and economic growth for centuries. The standardization of the railroad gauge revolutionized the flow of commodities, the standardization of money revolutionized debt markets and simplified trade, and the standardization of credit networks has allowed for the purchase of goods using money deposited in a bank half a world away. These advancements did not eradicate the different systems they affected instead, each system has been transformed so that it can interoperate with systems all over the world, while still preserving local diversity. As Palfrey and Gasser show, interoperability is a critical aspect of any successful system,and now it is more important than ever. Today we are confronted with challenges that affect us on a global scale: the financial crisis, the quest for sustainable energy, and the need to reform health care systems and improve global disaster response systems. The successful flow of information across systems is crucial if we are to solve these problems, but we must also learn to manage the vast degree of interconnection inherent in each system involved. Interoperability offers a number of solutions to these global challenges, but Palfrey and Gasser also consider its potential negative effects, especially with respect to privacy, security, and co-dependence of states indeed, interoperability has already sparked debates about document data formats, digital music, and how to create successful yet safe cloud computing. Interop demonstrates that, in order to get the most out of interoperability while minimizing its risks, we will need to fundamentally revisit our understanding of how it works, and how it can allow for improvements in each of its constituent parts. In Interop , Palfrey and Gasser argue that there needs to be a nuanced, stable theory of interoperability,one that still generates efficiencies, but which also ensures a sustainable mode of interconnection. Pointing the way forward for the new information economy, Interop provides valuable insights into how technological integration and innovation can flourish in the twenty-first century.

Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New):... Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New)
Michael T. Raggo, Chet Hosmer
R1,168 Discovery Miles 11 680 Ships in 12 - 19 working days

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. "Data Hiding "provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions fordata hiding"

Blockchain Applications in IoT Ecosystem (Hardcover, 1st ed. 2021): Tanupriya Choudhury, Abhirup Khanna, Teoh Teik Toe, Madhu... Blockchain Applications in IoT Ecosystem (Hardcover, 1st ed. 2021)
Tanupriya Choudhury, Abhirup Khanna, Teoh Teik Toe, Madhu Khurana, Nguyen Gia Nhu
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

This book focuses on the fundamentals of blockchain technology along with the means and methods of its integration with Internet of Things (IoT). The book allows the reader to have a deeper understanding of blockchain technology, IoT and various application areas wherein both technologies can be implemented. The book serves the purpose of providing knowledge about the fundamentals of blockchain and IoT to a common reader along with allowing a research scholar to identify some futuristic problem areas that emerge from the convergence of both technologies. Furthermore, the authors discuss relevant application areas such as smart city, e-healthcare, smart travel, etc. throughout the course of the book. The book also talks through a few case studies illustrating the implementation and benefits of using blockchain and IoT. Provides a comprehensive view of blockchain technology and its integration with IoT; Facilitates in having a valuable understanding of various application areas pertaining to blockchain and IoT; Assists the reader in exploring new research areas wherein blockchain and IoT can find their applicability based upon their list of benefits.

Digital Identity and Access Management - Technologies and Frameworks (Hardcover): Raj Sharman, Sanjukta Das Smith, Manish Gupta Digital Identity and Access Management - Technologies and Frameworks (Hardcover)
Raj Sharman, Sanjukta Das Smith, Manish Gupta
R5,391 Discovery Miles 53 910 Ships in 10 - 15 working days

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of problems, as system managers are faced with major organizational, economic and market changes and are also expected to increase reach and ease of access to users across cyberspace while guaranteeing the reliability and privacy of highly sensitive data.

Trends in Wireless Communication and Information Security - Proceedings of EWCIS 2020 (Hardcover, 1st ed. 2021): Mithun... Trends in Wireless Communication and Information Security - Proceedings of EWCIS 2020 (Hardcover, 1st ed. 2021)
Mithun Chakraborty, Raman Kr. Jha, Valentina Emilia Balas, Samarendra Nath Sur, Debdatta Kandar
R8,721 Discovery Miles 87 210 Ships in 12 - 19 working days

This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.

Evolution of Cognitive Networks and Self-Adaptive Communication Systems (Hardcover, New): Thomas D Lagkas, Panagiotis... Evolution of Cognitive Networks and Self-Adaptive Communication Systems (Hardcover, New)
Thomas D Lagkas, Panagiotis Sarigiannidis, Malamati Louta, Periklis Chatzimisios
R5,396 Discovery Miles 53 960 Ships in 10 - 15 working days

Cognitive networks can be crucial for the evolution of future communication systems; however, current trends have indicated major movement in other relevant fields towards the integration of different techniques for the realization of self-aware and self-adaptive communication systems. Evolution of Cognitive Networks and Self-Adaptive Communication Systems overviews innovative technologies combined for the formation of self-aware, self-adaptive, and self-organizing networks. By aiming to inform the research community and the related industry of solutions for cognitive networks, this book is essential for researchers, instructors, and professionals interested in clarifying the latest trends resulting in a unified realization for cognitive networking and communication systems.

Broadband Wireless Access Networks for 4G - Theory, Application, and Experimentation (Hardcover): Raul Aquino Santos, Victor... Broadband Wireless Access Networks for 4G - Theory, Application, and Experimentation (Hardcover)
Raul Aquino Santos, Victor Rangel Licea, Arthur Edwards Block
R6,457 Discovery Miles 64 570 Ships in 10 - 15 working days

With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of wideband and broadband wireless networks. Students, professors, researchers, and other professionals in the field will benefit from this book s practical applications and relevant studies."

Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet... Mommy! There's a Monster in our Computer - The book every parent should read to their child before they go on the Internet (Hardcover)
N. K. McCarthy; Illustrated by Arthur King; Introduction by Abby Anderson
R496 Discovery Miles 4 960 Ships in 12 - 19 working days
Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover): G. Nagarajan, R I Minu Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover)
G. Nagarajan, R I Minu
R7,600 Discovery Miles 76 000 Ships in 10 - 15 working days

Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed.... Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,522 Discovery Miles 25 220 Ships in 12 - 19 working days

This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,781 Discovery Miles 57 810 Ships in 10 - 15 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Trust Management and Information Security (Hardcover): Stephen Mason Trust Management and Information Security (Hardcover)
Stephen Mason
R3,567 R3,224 Discovery Miles 32 240 Save R343 (10%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R784 Discovery Miles 7 840
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,557 Discovery Miles 15 570
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R565 Discovery Miles 5 650
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,540 Discovery Miles 15 400
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160

 

Partners