0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New): Sajal K. Das, Krishna Kant, Nan Zhang Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New)
Sajal K. Das, Krishna Kant, Nan Zhang
R1,916 Discovery Miles 19 160 Ships in 10 - 15 working days

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Non-Functional Properties in Service Oriented Architecture - Requirements, Models and Methods (Hardcover, New): Nikola Milanovic Non-Functional Properties in Service Oriented Architecture - Requirements, Models and Methods (Hardcover, New)
Nikola Milanovic
R4,612 Discovery Miles 46 120 Ships in 18 - 22 working days

Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to the use of non-functional properties in SOA: requirements specification with respect to non-functional properties, modeling non-functional properties and implementation of non-functional properties. This book serves as both a practical reference and an advanced scientific source for those interested in current issues, new trends, and yet-unresolved areas of the discipline.

Amazon EMR Release Guide (Hardcover): Documentation Team Amazon EMR Release Guide (Hardcover)
Documentation Team
R2,868 Discovery Miles 28 680 Ships in 18 - 22 working days
Engineering Reliable Service Oriented Architecture - Managing Complexity and Service Level Agreements (Hardcover): Nikola... Engineering Reliable Service Oriented Architecture - Managing Complexity and Service Level Agreements (Hardcover)
Nikola Milanovic
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

Dynamic, trustworthy and reliable service delivery in Service Oriented Architectures (SOA) is one of the main preconditions for successful and sustainable business operations. Service and business process reliability is, therefore, of paramount importance and cannot be compromised. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements presents a guide to engineering reliable SOA systems and enhances current understanding of service reliability. It is an essential reference for both practitioners and researchers wishing to explore state-of-the art results from the field of reliable SOA application engineering.

Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R5,529 Discovery Miles 55 290 Ships in 18 - 22 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

HCI Challenges and Privacy Preservation in Big Data Security (Hardcover): Daphne Lopez, M.A. Saleem Durai HCI Challenges and Privacy Preservation in Big Data Security (Hardcover)
Daphne Lopez, M.A. Saleem Durai
R5,287 Discovery Miles 52 870 Ships in 18 - 22 working days

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover): Victor Lobo, Anacleto Correia Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover)
Victor Lobo, Anacleto Correia
R6,167 Discovery Miles 61 670 Ships in 18 - 22 working days

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover): Suhasini Verma, Vidhisha Vyas, Keshav Kaushik Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover)
Suhasini Verma, Vidhisha Vyas, Keshav Kaushik
R6,597 Discovery Miles 65 970 Ships in 18 - 22 working days

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition): M. Chapple CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition)
M. Chapple
R960 R828 Discovery Miles 8 280 Save R132 (14%) Ships in 18 - 22 working days

Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601. Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Perfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.

Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications (Hardcover, New): Joel J. P.... Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications (Hardcover, New)
Joel J. P. Rodrigues, Kai Lin, Jaime Lloret
R4,611 Discovery Miles 46 110 Ships in 18 - 22 working days

Recent technology trends involving the combination of mobile networks and cloud computing have offered new chances for mobile network providers to use specific carrier-cloud services. These advancements will enhance the utilization of the mobile cloud in industry and corporate settings. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications is a fundamental source for the advancement of knowledge, application, and practice in the interdisciplinary areas of mobile network and cloud computing. By addressing innovative concepts and critical issues, this book is essential for researchers, practitioners, and students interested in the emerging field of vehicular wireless networks.

Private Cloud Computing - Consolidation, Virtualization, and Service-Oriented Infrastructure (Paperback): Stephen R. Smoot, Nam... Private Cloud Computing - Consolidation, Virtualization, and Service-Oriented Infrastructure (Paperback)
Stephen R. Smoot, Nam K. Tan
R1,225 Discovery Miles 12 250 Ships in 10 - 15 working days

Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. "Private Cloud Computing "offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.
Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment modelProvides an overview of cloud security and cloud management from the server virtualization perspectivePresents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environmentOffers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation

Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New): Pedro... Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New)
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Tieyan Li
R4,805 Discovery Miles 48 050 Ships in 18 - 22 working days

Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.

Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover): Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover)
R4,573 Discovery Miles 45 730 Ships in 18 - 22 working days

About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).

Dynamic Spectrum Management (Hardcover): Ying-Chang Liang Dynamic Spectrum Management (Hardcover)
Ying-Chang Liang
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days
Amazon Pinpoint Developer Guide (Hardcover): Documentation Team Amazon Pinpoint Developer Guide (Hardcover)
Documentation Team
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
State of the Art Virtual Reality and Augmented Reality Knowhow (Hardcover): Nawaz Mohamudally State of the Art Virtual Reality and Augmented Reality Knowhow (Hardcover)
Nawaz Mohamudally
R3,066 Discovery Miles 30 660 Ships in 18 - 22 working days
Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover): G. Nagarajan, R I Minu Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover)
G. Nagarajan, R I Minu
R7,006 Discovery Miles 70 060 Ships in 18 - 22 working days

Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover): Ioan-Sorin Comsa, Ramona Trestian Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover)
Ioan-Sorin Comsa, Ramona Trestian
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,396 Discovery Miles 13 960 Ships in 10 - 15 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

Nowhere to Hide - Selections on Cybersecurity and Politics (Paperback): Restoring The Af Research Collection Nowhere to Hide - Selections on Cybersecurity and Politics (Paperback)
Restoring The Af Research Collection
R247 Discovery Miles 2 470 Ships in 18 - 22 working days
Principles and Applications of Distributed Event-Based Systems (Hardcover, New): Principles and Applications of Distributed Event-Based Systems (Hardcover, New)
R4,659 Discovery Miles 46 590 Ships in 18 - 22 working days

Recently, the event-based paradigm, a burgeoning technology receiving attention in research as well as industry, has gained momentum in the commercial world causing a need for further research in the field. Principles and Applications of Distributed Event-Based Systems showcases event-based systems in real-world applications, providing an overview of relevant terminology and content approachable for readers from a variety of backgrounds. Containing expert international contributions, this advanced publication provides professionals, researchers, and students in systems design with a rich compendium of latest applications in the field.

Cloud Computing Service and Deployment Models - Layers and Management (Hardcover, New): Alberto M. Bento, Anil K Aggarwal Cloud Computing Service and Deployment Models - Layers and Management (Hardcover, New)
Alberto M. Bento, Anil K Aggarwal
R4,717 Discovery Miles 47 170 Ships in 18 - 22 working days

Cloud Computing Service and Deployment Models: Layers and Management presents a collection of diverse perspectives on cloud computing and its vital role in all components of organizations. With its intent to benefit practitioners and industry professionals, this book aims to improve the understanding of cloud computing and tackle related concerns such as change management, security, processing approaches, and much more.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,331 Discovery Miles 53 310 Ships in 18 - 22 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Pervasive Cloud Computing Technologies - Future Outlooks and Interdisciplinary Perspectives (Hardcover): Lucio Grandinetti,... Pervasive Cloud Computing Technologies - Future Outlooks and Interdisciplinary Perspectives (Hardcover)
Lucio Grandinetti, Ornella Pisacane, Mehdi Sheikhalishahi
R4,810 Discovery Miles 48 100 Ships in 18 - 22 working days

Technology trends may come and go, but cloud computing technologies have been gaining consideration in the commercial world due to its ability to provide on-demand access to resources, control the software environment, and supplement existing systems. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives explores the latest innovations with cloud computing and the impact of these new models and technologies. This book will present case studies and research on the future of cloud computing technologies and its ability to increase connectivity of various entities of the world. It is an essential resource for technology practitioners, engineers, managers, and academics aiming to gain the knowledge of these novel and pervasive technologies.

Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
The Digital Pivot - Secrets of Online…
Eric Schwartzman Hardcover R660 Discovery Miles 6 600

 

Partners