0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover): G. Nagarajan, R I Minu Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover)
G. Nagarajan, R I Minu
R7,600 Discovery Miles 76 000 Ships in 10 - 15 working days

Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover): Ioan-Sorin Comsa, Ramona Trestian Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover)
Ioan-Sorin Comsa, Ramona Trestian
R5,264 Discovery Miles 52 640 Ships in 10 - 15 working days

The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.

Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed.... Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,522 Discovery Miles 25 220 Ships in 12 - 19 working days

This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,781 Discovery Miles 57 810 Ships in 10 - 15 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Trust Management and Information Security (Hardcover): Stephen Mason Trust Management and Information Security (Hardcover)
Stephen Mason
R3,567 R3,224 Discovery Miles 32 240 Save R343 (10%) Ships in 10 - 15 working days
State of the Art Virtual Reality and Augmented Reality Knowhow (Hardcover): Nawaz Mohamudally State of the Art Virtual Reality and Augmented Reality Knowhow (Hardcover)
Nawaz Mohamudally
R3,322 Discovery Miles 33 220 Ships in 10 - 15 working days
AWS Snowball User Guide (Hardcover): Documentation Team AWS Snowball User Guide (Hardcover)
Documentation Team
R2,323 R1,856 Discovery Miles 18 560 Save R467 (20%) Ships in 10 - 15 working days
Handbook of Research on Threat Detection and Countermeasures in Network Security (Hardcover): Alaa Hussein Al-Hamami, Ghossoon... Handbook of Research on Threat Detection and Countermeasures in Network Security (Hardcover)
Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
R8,780 Discovery Miles 87 800 Ships in 10 - 15 working days

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Technological Innovation for Applied AI Systems - 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing,... Technological Innovation for Applied AI Systems - 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2021, Costa de Caparica, Portugal, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Luis M. Camarinha-Matos, Pedro Ferreira, Guilherme Brito
R3,419 Discovery Miles 34 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2021, held in Costa de Caparica, Portugal, in July 2021.*The 34 papers presented were carefully reviewed and selected from 92 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; smart manufacturing; cyber-physical systems and digital twins; intelligent decision making; smart energy management; communications and electronics; classification systems; smart healthcare systems; and medical devices. *The conference was held virtually. Chapters "Characteristics of Adaptable Control of Production Systems and the Role of Self-organization Towards Smart Manufacturing" and "Predictive Manufacturing: Enabling Technologies, Frameworks and Applications" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Counter Terrorism Issues - Case Studies in the Courtroom (Paperback): James Ottavio Castagnera Counter Terrorism Issues - Case Studies in the Courtroom (Paperback)
James Ottavio Castagnera
R2,190 Discovery Miles 21 900 Ships in 12 - 19 working days

The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of the past two decades, Counter Terrorism Issues: Case Studies in the Courtroom presents a panoramic view of the American judiciary's handling of domestic terrorism in the last 20 years. Drawing extensively upon trial transcripts, witness statements, and judicial opinions, the book brings the underlying events back to life and demonstrates how the criminal justice system has sought to grapple with conflicting facts and countervailing legal rights and responsibilities. The book examines some of the most notorious recent cases-the two attacks on the World Trade Center, the Oklahoma City bombing, and the Fort Hood massacre. It also looks at lesser-known but equally important incidents, including those involving animal-rights radicals who harass university researchers and corporate executives, as well as the actions of terrorist "wannabes" who threaten our security. Also discussed are attempts by victims of terrorist attacks to sue state sponsors of terrorism. Through the words of witnesses, judges, and the attorneys who tried these cases in America's courtrooms, the book provides important commentary on the related back-stories and historical/political contexts of these events, enabling readers to understand the significance of these often-infamous attacks on U.S. soil.

Advanced Research on Cloud Computing Design and Applications (Hardcover): Shadi Aljawarneh Advanced Research on Cloud Computing Design and Applications (Hardcover)
Shadi Aljawarneh
R5,562 Discovery Miles 55 620 Ships in 10 - 15 working days

Modern society requires a specialized, persistent approach to IT service delivery. Cloud computing offers the most logical answer through a highly dynamic and virtualized resource made available by an increasing number of service providers. Advanced Research on Cloud Computing Design and Applications shares the latest high quality research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. This book is an essential reference source for researchers and practitioners in the field of cloud computing, as well as a guide for students, academics, or anyone seeking to learn more about advancement in IT services. This publication features chapters covering a broad range of relevant topics, including cloud computing for e-government, cloud computing in the public sector, security in the cloud, hybrid clouds and outsourced data, IT service personalization, and supply chain in the cloud.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R12,920 Discovery Miles 129 200 Ships in 10 - 15 working days
Privacy by Design for the Internet of Things - Building accountability and security (Hardcover): Andrew Crabtree, Hamed... Privacy by Design for the Internet of Things - Building accountability and security (Hardcover)
Andrew Crabtree, Hamed Haddadi, Richard Mortier
R3,367 R3,037 Discovery Miles 30 370 Save R330 (10%) Ships in 10 - 15 working days

Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers and socials scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.

Temporal QOS Management in Scientific Cloud Workflow Systems (Paperback, New): Xiao Liu, Jinjun Chen, Yun Yang Temporal QOS Management in Scientific Cloud Workflow Systems (Paperback, New)
Xiao Liu, Jinjun Chen, Yun Yang
R1,014 Discovery Miles 10 140 Ships in 12 - 19 working days

Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures.

"Temporal QOS Management in Scientific Cloud Workflow Systems" focuses on real world scientific applications which often must be completed by satisfying a set of temporal constraints such as milestones and deadlines. Meanwhile, activity duration, as a measurement of system performance, often needs to be monitored and controlled. This book demonstrates how to guarantee on-time completion of most, if not all, workflow applications. Offering a comprehensive framework to support the lifecycle of time-constrained workflow applications, this book will enhance the overall performance and usability of scientific cloud workflow systems.
Explains how to reduce the cost to detect and handle temporal violations while delivering high quality of service (QoS) Offers new concepts, innovative strategies and algorithms to support large-scale sophisticatedapplications in the cloud Improves the overall performance and usability of cloud workflow systems"

Communication Network Systems and Security (Hardcover): Pascal Formann Communication Network Systems and Security (Hardcover)
Pascal Formann
R3,049 R2,766 Discovery Miles 27 660 Save R283 (9%) Ships in 10 - 15 working days
Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R712 R628 Discovery Miles 6 280 Save R84 (12%) Ships in 10 - 15 working days
Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New): Pedro... Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New)
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Tieyan Li
R5,210 Discovery Miles 52 100 Ships in 10 - 15 working days

Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.

AWS CodeDeploy User Guide (Hardcover): Documentation Team AWS CodeDeploy User Guide (Hardcover)
Documentation Team
R2,412 Discovery Miles 24 120 Ships in 10 - 15 working days
The Future of Digital Work: The Challenge of Inequality - IFIP WG 8.2, 9.1, 9.4 Joint Working Conference, IFIPJWC 2020,... The Future of Digital Work: The Challenge of Inequality - IFIP WG 8.2, 9.1, 9.4 Joint Working Conference, IFIPJWC 2020, Hyderabad, India, December 10-11, 2020, Proceedings (Hardcover, 1st ed. 2020)
Rajendra K. Bandi, Ranjini C. R., Stefan Klein, Shirin Madon, Eric Monteiro
R2,926 Discovery Miles 29 260 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the IFIP WG 8.2, 9.1, 9.4 Joint Working Conference on the Future of Digital Work: The Challenge of Inequality, IFIPJWC 2020, which was supposed to be held in Hyderabad, India, in December 2020, but was held virtually due to the COVID-19 pandemic. This conference was organized for IFIP's 60th anniversary and to commemorate its mission to "achieve worldwide professional and socially responsible development and application of ICTs."The 22 full papers presented together with an introduction and two keynotes were carefully reviewed and selected from 29 submissions. They are organized in topics on: innovation and entrepreneurship; the social significance of digital platforms; transforming healthcare; and the dark side of digitalization.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,400 Discovery Miles 24 000 Ships in 10 - 15 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Thinking of... Force.Com as the Key to the Cloud Kingdom? Ask the Smart Questions (Hardcover): Alok Misra, Ian Gotts Thinking of... Force.Com as the Key to the Cloud Kingdom? Ask the Smart Questions (Hardcover)
Alok Misra, Ian Gotts
R821 Discovery Miles 8 210 Ships in 10 - 15 working days

This book is aimed squarely at the Independent Software Vendor (ISV) who is considering Force.com as a route to market their software offerings. Alternatively you could be part of a corporate IT department looking to deliver solutions more quickly for your business users. You have many of the same issues as the ISV, but from a slightly different perspective. This book is intended to be a catalyst for action aimed at a range of people inside and outside your organization

Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover): Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover)
R4,959 Discovery Miles 49 590 Ships in 10 - 15 working days

About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).

Simulation in Computer Network Design and Modeling - Use and Analysis (Hardcover, New): Hussein Al-Bahadili Simulation in Computer Network Design and Modeling - Use and Analysis (Hardcover, New)
Hussein Al-Bahadili
R5,329 Discovery Miles 53 290 Ships in 10 - 15 working days

Computer networks have become essential to the survival of businesses, organizations, and educational institutions, as the number of network users, services, and applications has increased alongside advancements in information technology. Given this, efforts have been put forward by researchers, designers, managers, analysts, and professionals to optimize network performance and satisfy the varied groups that have an interest in network design and implementation. Simulation in Computer Network Design and Modeling: Use and Analysis reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation. This reference will inform the work and research of academics, post-graduate students, developers, network designers, network analysts, telecommunication system designers, and others who are interested in using simulation in computer network design and modeling.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R12,913 Discovery Miles 129 130 Ships in 10 - 15 working days
Adversary-Aware Learning Techniques and Trends in Cybersecurity (Hardcover, 1st ed. 2021): Prithviraj Dasgupta, Joseph B.... Adversary-Aware Learning Techniques and Trends in Cybersecurity (Hardcover, 1st ed. 2021)
Prithviraj Dasgupta, Joseph B. Collins, Ranjeev Mittu
R4,117 Discovery Miles 41 170 Ships in 10 - 15 working days

This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lean Enterprise - The Essential…
Greg Caldwell Hardcover R658 R585 Discovery Miles 5 850
Coding for Kids Ages 10 and Up - Coding…
Bob Mather Hardcover R933 Discovery Miles 9 330
The Definitive Guide to Stellent Content…
Brian Huff Hardcover R1,643 Discovery Miles 16 430
Python for Data Analysis - Learn the…
Robert Campbell Hardcover R823 R717 Discovery Miles 7 170
Pro Apache XML
Poornachandra Sarang Hardcover R1,494 Discovery Miles 14 940
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire Hardcover R6,675 Discovery Miles 66 750
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,718 Discovery Miles 97 180
Web-Based Services - Concepts…
Information Reso Management Association Hardcover R18,336 Discovery Miles 183 360
Developing Advanced Web Services Through…
Khaleb Ragab Hardcover R4,938 Discovery Miles 49 380
Web Technologies & Applications
Sammulal Porika, M Peddi Kishore Hardcover R3,500 R2,924 Discovery Miles 29 240

 

Partners