0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (340)
  • R250 - R500 (935)
  • R500+ (16,282)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Paperback): Carol L. Stimmel Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Paperback)
Carol L. Stimmel
R1,360 Discovery Miles 13 600 Ships in 12 - 17 working days

While emerging technologies create massive opportunity, especially for investors and companies that seek more adaptable forms of economic growth than currently available, value is held inert by traditional approaches, patents, and other closed systems. Yet, open data, content, and information may be the key to mass innovation for future technologies, although they bring difficult challenges to private-industry models that depend on the established ideas of intellectual property. It is from this foundational observation that OpenXFORM (a blending of the words Open and the engineering abbreviation for Transformation) was developed and is explored and described in this book. The intent of the model design is to synthesize an approach to the process of innovation, inspired by natural systems and human-centric design processes. OpenXFORM describes how an open system of innovation can adapt to the unregulated world of information, data, and content; can decompose its own information to release to the open world; and can discover ways to find the points of synergy among the studied and tested methodologies that put human relationships first. This book presents an explicit innovation process that shows how to move from a breakthrough idea through a process that encourages innovative thinkers to test their assumptions, validate hypotheses, and tune and tweak their ideas, not only to drive solutions for users but also to meet the strategic goals of their companies. The anatomy of innovation through OpenXFORM contains the process for moving ideas from a flight of fancy to an explicit concept that is ready to produce.

Leading and Motivating Global Teams - Integrating Offshore Centers and the Head Office (Paperback): Vimal Kumar Khanna Leading and Motivating Global Teams - Integrating Offshore Centers and the Head Office (Paperback)
Vimal Kumar Khanna
R1,348 Discovery Miles 13 480 Ships in 12 - 17 working days

This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity. Readers learn how to integrate the offshore center with the head office to make the offshore team an extension of the head office. While integrating teams with the head office, offshore center managers can still retain independence and authority to meet team aspirations. The book provides insight into devising new organizational structures to balance the authority and responsibilities of offshore center and head office managers. Head office managers responsible for managing globally distributed projects learn how to achieve a higher success rate on their projects and be better rewarded for their efforts in offshoring. Head office managers also learn techniques to make more significant contributions in their expatriate assignments to the offshore center. This book guides both the offshore center managers and the head office managers to fully realize the potential of the offshore center, which can result in higher revenues and profitability.

Oracle Business Intelligence and Essbase Solutions Guide (Paperback): Rosendo Abellera, Lakshman Bulusu Oracle Business Intelligence and Essbase Solutions Guide (Paperback)
Rosendo Abellera, Lakshman Bulusu
R1,352 Discovery Miles 13 520 Ships in 12 - 17 working days

This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution. It explains the key steps involved in Oracle Essbase and OBIEE implementations. Using case studies, the book covers Oracle Essbase for analytical BI and data integration, using OBIEE for operational BI including presentation services and BI Publisher for real-time reporting services, Self-service BI- in terms of VLDB, scalability, high performance, stability, long-lasting and ease of use that saves time, effort, and costs, while maximizing ROI.

Project and Program Turnaround (Paperback): Thomas Pavelko Project and Program Turnaround (Paperback)
Thomas Pavelko
R1,366 Discovery Miles 13 660 Ships in 12 - 17 working days

The U.S. economy thrives on the development of new products, new systems, and new processes. Usually, these advances start as a flash of inspiration by highly creative individuals. It is complex and difficult to go from initial inspiration to a final product, process, or system. So it is not surprising that approximately one out of every four development programs fails. A development program or project in trouble is distinct from a program encountering typical development difficulties. Such a program or project can appear to be in free fall. This book identifies the essential fundamentals for executing a program or project turnaround effectively. These fundamentals include: Clearly identifying the next critical accomplishment needed for success Assigning responsibility for each program task to one person Capitalizing on colocation and face-to-face communication Recruiting problem solvers Wining commitment from team members Using team accomplishments to propel high team morale The guidance provided in this book is applicable to all program or project genres, including manufacturing, nonprofit work, education, medicine, investment management, and municipal management. Software has become a great part of both providing product functionality and assisting with managing product development. A special chapter devoted to software development dispels common misconceptions and provides guidance for turning around this special type of project or program. This book is a highly valuable source of insight for a wide range of readers, including management professionals, business students, and executive managers. Every member of a product or project development team will find its recommendations to be of high value.

Project Management in Extreme Situations - Lessons from Polar Expeditions, Military and Rescue Operations, and Wilderness... Project Management in Extreme Situations - Lessons from Polar Expeditions, Military and Rescue Operations, and Wilderness Exploration (Paperback)
Monique Aubry, Pascal Lievre
R1,367 Discovery Miles 13 670 Ships in 12 - 17 working days

The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start. The current high level of change and complexity confronting organizational leaders and managers requires a new approach to projects so they can be managed flexibly to embrace and exploit change. What once used to be considered extreme uncertainty is now the norm, and managing planned projects is being replaced by managing projects as they evolve. Successfully managing projects in extreme situations, such as polar and military expeditions, shows how to manage successfully projects in today's turbulent environment. Executed under the harshest and most unpredictable conditions, these projects are great sources for learning about how to manage unexpected and unforeseen situations as they occur. This book presents multiple case studies of managing extreme events as they happened during polar, mountain climbing, military, and rescue expeditions. A boat accident in the Artic is a lesson on how an effective project manager must be ambidextrous: on one hand able to follow plans and on the other hand able to abandon those plans when disaster strikes and improvise new ones in response. Polar expeditions also illustrate how a team can use "weak links" to go beyond its usual information network to acquire strategic information. Fire and rescues operations illustrate how one team member's knowledge can be transferred to the entire team. Military operations provide case material on how teams coordinate and make use of both individual and collective competencies. This groundbreaking work pushes the definitions of a project and project management to reveal new insight that benefits researchers, academics, and the practitioners managing projects in today's challenging and uncertain times.

Making It in IT (Paperback): Terry Critchley Making It in IT (Paperback)
Terry Critchley
R1,364 Discovery Miles 13 640 Ships in 12 - 17 working days

Written for those starting a career in IT or whose career is well advanced, this career guide shows how to blaze a path to success through the jungle of modern IT. With a career spanning five decades, the author shares lessons he learned the hard way so readers do not have to learn them the hard way. By emphasizing the importance of business processes and applications to IT, this book explains how to understand the value and positioning of hardware and software technology in order to make appropriate decisions. It addresses the importance of IT architecture and the roles service and systems management play. It also explains service level agreements (SLAs) and provides sample SLAs. Readers learn how to conduct IT assessments using SWOT (strengths, weaknesses, opportunities, and threats) analysis. It also shows how to use root-cause analysis (RCA) to detect the sources of failure and poor performance. An overview of risk management and the steps involved in developing a business continuity plan are also included. The book looks at all facets of an IT professional's career. It explains how to build an IT team and examines the roles and responsibilities within the team. It shows how to provide professional customer care to IT clients. Business executives recognize the importance of IT, and this book shows technology professionals how to thrive in the business world. It covers: Making effective presentations Report and proposal writing Negotiating and persuasion skills Running productive meetings Time and stress management The book also discusses such important career skills as listening, continual and incremental learning, and communicating at all levels. From its templates and checklists to its comprehensive and holistic view of a successful IT career, this book is an indispensable guide for every professional working in IT today and tomorrow.

High-Performance IT Services (Paperback): Terry Critchley High-Performance IT Services (Paperback)
Terry Critchley
R1,410 Discovery Miles 14 100 Ships in 12 - 17 working days

This book on performance fundamentals covers UNIX, OpenVMS, Linux, Windows, and MVS. Most of the theory and systems design principles can be applied to other operating systems, as can some of the benchmarks. The book equips professionals with the ability to assess performance characteristics in unfamiliar environments. It is suitable for practitioners, especially those whose responsibilities include performance management, tuning, and capacity planning. IT managers with a technical outlook also benefit from the book as well as consultants and students in the world of systems for the first time in a professional capacity.

Effective Methods for Software Engineering (Paperback): Boyd Summers Effective Methods for Software Engineering (Paperback)
Boyd Summers
R1,348 Discovery Miles 13 480 Ships in 12 - 17 working days

Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author's experience in software engineering as a programmer in the defense and aerospace industries, this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop, operate, and maintain software engineering capabilities by instilling an engineering discipline to support programming, design, builds, and delivery to customers. This book helps software engineers to: Understand the basic concepts, standards, and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view, this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools, whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today's software-dependent society.

The Internet of Things and Big Data Analytics - Integrated Platforms and Industry Use Cases (Paperback): Pethuru Raj,... The Internet of Things and Big Data Analytics - Integrated Platforms and Industry Use Cases (Paperback)
Pethuru Raj, Balamurugan Balusamy, Manju Khari, T Poongodi
R1,370 Discovery Miles 13 700 Ships in 12 - 17 working days

This book comprehensively conveys the theoretical and practical aspects of IoT and big data analytics with the solid contributions from practitioners as well as academicians. This book examines and expounds the unique capabilities of the big data analytics platforms in capturing, cleansing and crunching IoT device/sensor data in order to extricate actionable insights. A number of experimental case studies and real-world scenarios are incorporated in this book in order to instigate our book readers. This book Analyzes current research and development in the domains of IoT and big data analytics Gives an overview of latest trends and transitions happening in the IoT data analytics space Illustrates the various platforms, processes, patterns, and practices for simplifying and streamlining IoT data analytics The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases examines and accentuates how the multiple challenges at the cusp of IoT and big data can be fully met. The device ecosystem is growing steadily. It is forecast that there will be billions of connected devices in the years to come. When these IoT devices, resource-constrained as well as resource-intensive, interact with one another locally and remotely, the amount of multi-structured data generated, collected, and stored is bound to grow exponentially. Another prominent trend is the integration of IoT devices with cloud-based applications, services, infrastructures, middleware solutions, and databases. This book examines the pioneering technologies and tools emerging and evolving in order to collect, pre-process, store, process and analyze data heaps in order to disentangle actionable insights.

ERP Systems for Manufacturing Supply Chains - Applications, Configuration, and Performance (Paperback): Odd Joran Sagegg,... ERP Systems for Manufacturing Supply Chains - Applications, Configuration, and Performance (Paperback)
Odd Joran Sagegg, Erlend Alfnes
R1,356 Discovery Miles 13 560 Ships in 12 - 17 working days

ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems, the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module's structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises, as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However, there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system's core modules and functions, this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility, as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies.

RIoT Control - Understanding and Managing Risks and the Internet of Things (Paperback, UK ed.): Tyson Macaulay RIoT Control - Understanding and Managing Risks and the Internet of Things (Paperback, UK ed.)
Tyson Macaulay
R1,461 R1,185 Discovery Miles 11 850 Save R276 (19%) Ships in 12 - 17 working days

In RIOT Control, security experts from McAfee discuss how the Internet of Things (IoT) flips the current internet with de-centralized, uncontrolled elements driving massive data from the ends into central servers and the cloud, rather than the other way around. Some estimates suggest that every human being will soon be surrounded by 1,000 to 5,000 connected objects eventually, 100 trillion static or moving objects which makes for a complex system, prone to unexpected behaviors. As various industry domains rush to adopt IoT technologies, they need guidance on IoT-ready security and risk management practices to ensure system availability and security.

This book explains IoT risk in terms of project requirements, business needs, and system designs that include endpoints, network connectivity, and cloud-based data centers. Understand the threats and vulnerabilities of the IoT, as well as performance metrics at the enterprise level. In recommending emerging techniques, the authors provide insight to help judge which are best according to specific risks and organizational needs under consideration. Multiple case studies span several chapters to better illustrate the business, operational, and technical risks inherent in IoT deployments.
Explains sources of risk across IoT architectures: endpoints, network, and cloud-based data centersIncludes multiple case studies threaded through several chapters covering business, operational, and technical risk issuesOffers insight from Intel (McAfee) insiders about emerging tools and techniques for real-world IoT systems

Remote Delivery - A Guide to Software Delivery through Collaboration between Distributed Teams (Hardcover): Zhengping Qu Remote Delivery - A Guide to Software Delivery through Collaboration between Distributed Teams (Hardcover)
Zhengping Qu
R2,560 Discovery Miles 25 600 Ships in 9 - 15 working days

This book records the author's years of experience in the software industry. In his own practices, the author has found that the distributed work pattern has become increasingly popular in more and more work environments, either between vendors and customers or between different teams inside a company. This means that all practitioners in the software industry need to adapt to this new way of communication and collaboration and get skilled enough to meet the greater challenges in integrating the distributed work pattern with agile software delivery. By centering on the difficulties in communication and collaboration between distributed teams, this book digs into the reasons why so many remote delivery projects end up anticlimactic and provides solutions for readers' reference. It also cites successful cases in promoting agile development in distributed teams, which has been a vexing problem for many software development companies. In addition, readers can find suggestions and measures for building self-managing teams in this book. Remote Delivery: A Guide to Software Delivery through Collaboration between Distributed Teams is a very practical guide for software delivery teams with their members distributed in different places and companies engaged in software customization. Developers, QAs, product managers, and project leaders can also be inspired by this book.

PCI Dss: A Pocket Guide (Paperback, 6th ed.): IT Governance PCI Dss: A Pocket Guide (Paperback, 6th ed.)
IT Governance
R363 Discovery Miles 3 630 Ships in 12 - 17 working days

This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.

The Internet of Materials (Paperback): Christos Liaskos The Internet of Materials (Paperback)
Christos Liaskos
R1,122 Discovery Miles 11 220 Ships in 12 - 17 working days

State-of-the-art, flat structures called metasurfaces can filter and steer light and sound, render an object completely invisible to electromagnetic waves, and much more. They can deliver automation, remote operation, and advanced performance to a wide variety of existing systems, with applications in communications, medical imaging, sensing, and security. However, for non-specialists, individual metasurfaces are currently restricted to limited reusability and accessibility. This book brings together various scientific disciplines with the aim of outlining a programmable 'plug-and-play' metasurface. The book focuses on a recently proposed platform - known as the HyperSurface - that provides many electromagnetic functions of metasurfaces in a single structure, which can be controlled and reconfigured by software. This revolutionary approach paves the way for new opportunities in wireless communications and programmable wireless environments: HyperSurfaces could link networks with objects and physical environments and create smarter systems that are far more responsive to user demands. Walls that absorb radiation or block digital eavesdropping, and wireless, long-distance charging of devices are among the many possibilities. The book aspires to provide the foundational knowledge for creating an Internet of Materials, enabling smart environments at any scale - from indoor wireless communications to medical imaging equipment. Although the set of disciplines involved covers a considerable span, we hope that the material will benefit experts and students alike.

The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback): Preston Bukaty The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback)
Preston Bukaty
R875 Discovery Miles 8 750 Ships in 12 - 17 working days

Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd edition): Mano Paul Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd edition)
Mano Paul
R2,503 Discovery Miles 25 030 Ships in 9 - 15 working days

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences-data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create. Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2 (R) Guide to the CSSLP (R) CBK (R), Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure-both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more. Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow.

Cloud VR - Technology and Application (Paperback): Huaping Xiong, Dawei Li, Kun Huang, Mu Xu, Yin Huang, Lingling Xu, Jianfei... Cloud VR - Technology and Application (Paperback)
Huaping Xiong, Dawei Li, Kun Huang, Mu Xu, Yin Huang, …
R1,357 Discovery Miles 13 570 Ships in 12 - 17 working days

Based on the technical accumulation and practice of Huawei iLab in the Cloud VR field, this book systematically describes the advantages of Cloud VR technologies; technical requirements on clouds, networks, and terminals as well as solution implementation; Cloud VR experience evaluation baselines and methods; and current business practices. Cloud VR introduces cloud computing and cloud rendering to VR services. With fast and stable networks, cloud-based display output and audio output are coded, compressed, and transmitted to user terminals, implementing cloud-based VR service content and content rendering. Cloud VR has stringent requirements on bandwidth and latency, making it a proficient application for 5G and gigabit home broadband networks in the era of "dual G". As the first advocate of Cloud VR, Huawei iLab developed the first prototype of the Cloud VR technical solution, initiated the industry's first Cloud VR industry cooperation plan - VR OpenLab with partners - and incubated the world's first Cloud VR commercial project with China Mobile Fujian. Cloud VR: Technology and Application is the first official publication of Huawei iLab's research and practice achievements. It systematically and thoroughly introduces the Cloud VR concept, solution architecture, key technologies, and business practices and is of great value in academic and social applications. This book is easy to understand, practical, and suitable for VR vendors, VR technology enthusiasts, carriers, network vendors, cloud service providers, universities, and other enterprises and scientific research institutes.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,239 Discovery Miles 12 390 Ships in 12 - 17 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Analyzing US Census Data - Methods, Maps, and Models in R (Hardcover): Kyle Walker Analyzing US Census Data - Methods, Maps, and Models in R (Hardcover)
Kyle Walker
R4,364 Discovery Miles 43 640 Ships in 12 - 17 working days

Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.

Innovation in Crisis Management (Hardcover): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Hardcover)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R3,789 Discovery Miles 37 890 Ships in 12 - 17 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Google Cloud Certified Professional Cloud Architect Study Guide, 2nd Edition (Paperback): D. Sullivan Google Cloud Certified Professional Cloud Architect Study Guide, 2nd Edition (Paperback)
D. Sullivan
R1,137 Discovery Miles 11 370 Ships in 12 - 17 working days

An indispensable guide to the newest version of the Google Certified Professional Cloud Architect certification The newly revised Second Edition of the Google Cloud Certified Professional Cloud Architect Study Guide delivers a proven and effective roadmap to success on the latest Professional Cloud Architect accreditation exam from Google. You'll learn the skills you need to excel on the test and in the field, with coverage of every exam objective and competency, including focus areas of the latest exam such as Kubernetes, Anthos, and multi-cloud architectures. The book explores the design, analysis, development, operations, and migration components of the job, with intuitively organized lessons that align with the real-world job responsibilities of a Google Cloud professional and with the PCA exam topics. Architects need more than the ability to recall facts about cloud services, they need to be able to reason about design decisions. This study guide is unique in how it helps you learn to think like an architect: understand requirements, assess constraints, choose appropriate architecture patterns, and consider the operational characteristics of the systems you design. Review questions and practice exams use scenario-based questions like those on the certification exam to build the test taking skills you will need. In addition to comprehensive material on compute resources, storage systems, networks, security, legal and regulatory compliance, reliability design, technical and business processes, and more, you'll get: The chance to begin or advance your career as an in-demand Google Cloud IT professional Invaluable opportunities to develop and practice the skills you'll need as a Google Cloud Architect Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The ideal resource for anyone preparing for the Professional Cloud Architect certification from Google, Google Cloud Certified Professional Cloud Architect Study Guide, 2nd Edition is also a must-read resource for aspiring and practicing cloud professionals seeking to expand or improve their technical skillset and improve their effectiveness in the field.

CompTIA Network+ Practice Tests  Exam N10-008, 2e (Paperback, 2nd Edition): T Lammle CompTIA Network+ Practice Tests Exam N10-008, 2e (Paperback, 2nd Edition)
T Lammle
R755 Discovery Miles 7 550 Ships in 12 - 17 working days

Assess and improve your networking skillset with proven Sybex practice tests In the freshly revised Second Edition of CompTIA Network+ Practice Tests Exam N10-008, IT expert and author Craig Zacker delivers a set of accessible and useful practice tests for the updated Network+ Exam N10-008. You'll prepare for the exam, learn the information you need in an industry interview, and get ready to excel in your first networking role. These practice tests will gauge your skills in deploying wired and wireless devices; understanding network documentation and the purpose of network services; work with datacenter, cloud, and virtual networking concepts; monitor network activity; and more. Further, this book offers: Comprehensive coverage of all five domain areas of the updated Network+ exam, including networking fundamentals, implementations, operations, security, and troubleshooting Practical and efficient preparation for the Network+ exam with hundreds of domain-by-domain questions Access to the Sybex interactive learning environment and online test bank Perfect for anyone preparing for the CompTIA Network+ Exam N10-008, the CompTIA Network+ Practice Tests Exam N10-008 is also an indispensable resource for network administrators seeking to enhance their skillset with new, foundational skills in a certification endorsed by industry leaders around the world.

Cloud Computing - Concepts and Technologies (Paperback): Sunilkumar Manvi, Gopal Shyam Cloud Computing - Concepts and Technologies (Paperback)
Sunilkumar Manvi, Gopal Shyam
R1,390 Discovery Miles 13 900 Ships in 9 - 15 working days

Comprehensive and timely, Cloud Computing: Concepts and Technologies offers a thorough and detailed description of cloud computing concepts, architectures, and technologies, along with guidance on the best ways to understand and implement them. It covers the multi-core architectures, distributed and parallel computing models, virtualization, cloud developments, workload and Service-Level-Agreements (SLA) in cloud, workload management. Further, resource management issues in cloud with regard to resource provisioning, resource allocation, resource mapping and resource adaptation, ethical, non-ethical and security issues in cloud are followed by discussion of open challenges and future directions. This book gives students a comprehensive overview of the latest technologies and guidance on cloud computing, and is ideal for those studying the subject in specific modules or advanced courses. It is designed in twelve chapters followed by laboratory setups and experiments. Each chapter has multiple choice questions with answers, as well as review questions and critical thinking questions. The chapters are practically-focused, meaning that the information will also be relevant and useful for professionals wanting an overview of the topic.

Applications of Cloud Computing - Approaches and Practices (Paperback): Prerna Sharma, Mool Chand Sharma, Mohamed Elhoseny Applications of Cloud Computing - Approaches and Practices (Paperback)
Prerna Sharma, Mool Chand Sharma, Mohamed Elhoseny
R1,456 Discovery Miles 14 560 Ships in 9 - 15 working days

Provides the fundamentals of cloud computing; Focuses on new applications for cloud computing; Analyzes real-time problems

Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,029 Discovery Miles 30 290 Ships in 12 - 17 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R236 Discovery Miles 2 360
8 Steps to Better Security - A Simple…
K Crawley Paperback R524 Discovery Miles 5 240
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R449 Discovery Miles 4 490
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,036 Discovery Miles 10 360
Guide to Networking Essentials
Greg Tomsho Paperback R1,337 R1,199 Discovery Miles 11 990
CISA - Certified Information Systems…
Cannon Paperback R1,653 R1,274 Discovery Miles 12 740
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners