0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,565)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover): G. Nagarajan, R I Minu Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover)
G. Nagarajan, R I Minu
R7,006 Discovery Miles 70 060 Ships in 18 - 22 working days

Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover): Ioan-Sorin Comsa, Ramona Trestian Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover)
Ioan-Sorin Comsa, Ramona Trestian
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.

Amazon WorkSpaces Administration Guide (Hardcover): Documentation Team Amazon WorkSpaces Administration Guide (Hardcover)
Documentation Team
R889 Discovery Miles 8 890 Ships in 18 - 22 working days
Principles and Applications of Distributed Event-Based Systems (Hardcover, New): Principles and Applications of Distributed Event-Based Systems (Hardcover, New)
R4,659 Discovery Miles 46 590 Ships in 18 - 22 working days

Recently, the event-based paradigm, a burgeoning technology receiving attention in research as well as industry, has gained momentum in the commercial world causing a need for further research in the field. Principles and Applications of Distributed Event-Based Systems showcases event-based systems in real-world applications, providing an overview of relevant terminology and content approachable for readers from a variety of backgrounds. Containing expert international contributions, this advanced publication provides professionals, researchers, and students in systems design with a rich compendium of latest applications in the field.

Cloud Computing Service and Deployment Models - Layers and Management (Hardcover, New): Alberto M. Bento, Anil K Aggarwal Cloud Computing Service and Deployment Models - Layers and Management (Hardcover, New)
Alberto M. Bento, Anil K Aggarwal
R4,717 Discovery Miles 47 170 Ships in 18 - 22 working days

Cloud Computing Service and Deployment Models: Layers and Management presents a collection of diverse perspectives on cloud computing and its vital role in all components of organizations. With its intent to benefit practitioners and industry professionals, this book aims to improve the understanding of cloud computing and tackle related concerns such as change management, security, processing approaches, and much more.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,331 Discovery Miles 53 310 Ships in 18 - 22 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Pervasive Cloud Computing Technologies - Future Outlooks and Interdisciplinary Perspectives (Hardcover): Lucio Grandinetti,... Pervasive Cloud Computing Technologies - Future Outlooks and Interdisciplinary Perspectives (Hardcover)
Lucio Grandinetti, Ornella Pisacane, Mehdi Sheikhalishahi
R4,810 Discovery Miles 48 100 Ships in 18 - 22 working days

Technology trends may come and go, but cloud computing technologies have been gaining consideration in the commercial world due to its ability to provide on-demand access to resources, control the software environment, and supplement existing systems. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives explores the latest innovations with cloud computing and the impact of these new models and technologies. This book will present case studies and research on the future of cloud computing technologies and its ability to increase connectivity of various entities of the world. It is an essential resource for technology practitioners, engineers, managers, and academics aiming to gain the knowledge of these novel and pervasive technologies.

Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

Networking, Models and Methods of Cloud Computing (Hardcover): Michel Levine Networking, Models and Methods of Cloud Computing (Hardcover)
Michel Levine
R3,287 R2,977 Discovery Miles 29 770 Save R310 (9%) Ships in 18 - 22 working days
Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R656 R585 Discovery Miles 5 850 Save R71 (11%) Ships in 18 - 22 working days
Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence... Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence (Hardcover)
Judith Symonds, John Ayoade, Dave Parry
R4,939 Discovery Miles 49 390 Ships in 18 - 22 working days

There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.

Seven Deadliest Network Attacks (Paperback): Stacy Prowell, Rob Kraus, Mike Borkin Seven Deadliest Network Attacks (Paperback)
Stacy Prowell, Rob Kraus, Mike Borkin
R576 Discovery Miles 5 760 Ships in 10 - 15 working days

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers.

Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover): Anargyros Chryssanthou,... Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover)
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
R6,136 Discovery Miles 61 360 Ships in 18 - 22 working days

Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.

System Assurance - Beyond Detecting Vulnerabilities (Paperback): Nikolai Mansourov, Djenana Campara System Assurance - Beyond Detecting Vulnerabilities (Paperback)
Nikolai Mansourov, Djenana Campara
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion.

System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance, the book teaches you how to use the Object Management Group s (OMG) expertise and unique standards to obtain accurate knowledge about your existing software and compose objective metrics for system assurance. OMG s Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about your existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, you will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and affordable System Assurance.Includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture and code analysis guided by the assurance argument.Case Study illustrating the steps of the System Assurance Methodology using automated tools."

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,327 Discovery Miles 103 270 Ships in 18 - 22 working days
Developing and Evaluating Security-Aware Software Systems (Hardcover): Khaled M Khan Developing and Evaluating Security-Aware Software Systems (Hardcover)
Khaled M Khan
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover): Mahmoud Eid Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover)
Mahmoud Eid
R4,959 Discovery Miles 49 590 Ships in 18 - 22 working days

Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.

Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback): Diane Barrett,... Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback)
Diane Barrett, Gregory Kipper
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. This book will be a valuable resource for forensic investigators (corporate and law enforcement) and incident response professionals.

Digital Triage Forensics - Processing the Digital Crime Scene (Paperback): Stephen Pearson, Richard Watson Digital Triage Forensics - Processing the Digital Crime Scene (Paperback)
Stephen Pearson, Richard Watson
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF is used by the U.S. Army and other traditional police agencies for current digital forensic applications. The tools, training, and techniques from this practice are being brought to the public in this book for the first time. Now corporations, law enforcement, and consultants can benefit from the unique perspectives of the experts who coined Digital Triage Forensics. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations. This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored. This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.

Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback): Naomi Alpern Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback)
Naomi Alpern
R486 R411 Discovery Miles 4 110 Save R75 (15%) Ships in 10 - 15 working days

The "11th Hour Network+ Study Guide" is keyed to theN10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Five Toughest Questions and answers help you to prepare

The 11th Hour Study Guide Series focuses on just the essentials needed to pass your certification exam and make the most of the last days before the test
The only book keyed to the new 2009 objectives that has beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includesreview of five toughest questions by topic- sure to improve your score"

Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management... Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management (Hardcover, New)
Alan Rea
R4,584 Discovery Miles 45 840 Ships in 18 - 22 working days

Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning, implementing, working within, and managing these promising virtual technologies for secure processes and initiatives. This publication discusses the uses and potential of these virtual technologies and examines secure policy formation and practices that can be applied specifically to each.

Amazon Redshift Cluster Management Guide (Hardcover): Documentation Team Amazon Redshift Cluster Management Guide (Hardcover)
Documentation Team
R2,196 Discovery Miles 21 960 Ships in 18 - 22 working days
IoT Architectures, Models, and Platforms for Smart City Applications (Hardcover): Bhawani Shankar Chowdhry, Faisal Karim... IoT Architectures, Models, and Platforms for Smart City Applications (Hardcover)
Bhawani Shankar Chowdhry, Faisal Karim Shaikh, Naeem Ahmed Mahoto
R6,566 Discovery Miles 65 660 Ships in 18 - 22 working days

Developing countries are persistently looking for efficient and cost-effective methods for transforming their communities into smart cities. Unfortunately, energy crises have increased in these regions due to a lack of awareness and proper utilization of technological methods. These communities must explore and implement innovative solutions in order to enhance citizen enrollment, quality of government, and city intelligence. IoT Architectures, Models, and Platforms for Smart City Applications provides emerging research exploring the theoretical and practical aspects of transforming cities into intelligent systems using IoT-based design models and sustainable development projects. This publication looks at how cities can be built as smart cities within limited resources and existing advanced technologies. Featuring coverage on a broad range of topics such as cloud computing, human machine interface, and ad hoc networks, this book is ideally designed for urban planners, engineers, IT specialists, computer engineering students, research scientists, academicians, technology developers, policymakers, researchers, and designers seeking current research on smart applications within urban development.

Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New): Ramona Trestian, Gabriel-Miro Muntean Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New)
Ramona Trestian, Gabriel-Miro Muntean
R5,899 Discovery Miles 58 990 Ships in 18 - 22 working days

In the ever-evolving telecommunication industry, technological improvements alone are not able to keep up with the significant growth of mobile broadband traffic. As such, new research on communications networks is necessary to keep up with rising demand. Convergence of Broadband, Broadcast, and Cellular Network Technologies addresses the problems of broadband, broadcast, and cellular coexistence, including the increasing number of advanced mobile users and their bandwidth demands. This book will serve as a link between academia and industry, serving students, researchers, and industry professionals.

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,418 Discovery Miles 14 180 Ships in 10 - 15 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network Science - Analysis and…
CAR Pinheiro Hardcover R2,245 Discovery Miles 22 450
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Blockchain Technology in Corporate…
K Sood Hardcover R4,308 Discovery Miles 43 080
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150

 

Partners