0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

Networking, Models and Methods of Cloud Computing (Hardcover): Michel Levine Networking, Models and Methods of Cloud Computing (Hardcover)
Michel Levine
R3,287 R2,977 Discovery Miles 29 770 Save R310 (9%) Ships in 18 - 22 working days
Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R656 R585 Discovery Miles 5 850 Save R71 (11%) Ships in 18 - 22 working days
CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition): M. Chapple CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition)
M. Chapple
R960 R828 Discovery Miles 8 280 Save R132 (14%) Ships in 18 - 22 working days

Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601. Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Perfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.

Nowhere to Hide - Selections on Cybersecurity and Politics (Paperback): Restoring The Af Research Collection Nowhere to Hide - Selections on Cybersecurity and Politics (Paperback)
Restoring The Af Research Collection
R247 Discovery Miles 2 470 Ships in 18 - 22 working days
Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence... Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence (Hardcover)
Judith Symonds, John Ayoade, Dave Parry
R4,939 Discovery Miles 49 390 Ships in 18 - 22 working days

There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.

Seven Deadliest Network Attacks (Paperback): Stacy Prowell, Rob Kraus, Mike Borkin Seven Deadliest Network Attacks (Paperback)
Stacy Prowell, Rob Kraus, Mike Borkin
R576 Discovery Miles 5 760 Ships in 10 - 15 working days

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers.

Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover): Anargyros Chryssanthou,... Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover)
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
R6,136 Discovery Miles 61 360 Ships in 18 - 22 working days

Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.

System Assurance - Beyond Detecting Vulnerabilities (Paperback): Nikolai Mansourov, Djenana Campara System Assurance - Beyond Detecting Vulnerabilities (Paperback)
Nikolai Mansourov, Djenana Campara
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion.

System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance, the book teaches you how to use the Object Management Group s (OMG) expertise and unique standards to obtain accurate knowledge about your existing software and compose objective metrics for system assurance. OMG s Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about your existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, you will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and affordable System Assurance.Includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture and code analysis guided by the assurance argument.Case Study illustrating the steps of the System Assurance Methodology using automated tools."

Developing and Evaluating Security-Aware Software Systems (Hardcover): Khaled M Khan Developing and Evaluating Security-Aware Software Systems (Hardcover)
Khaled M Khan
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover): Mahmoud Eid Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover)
Mahmoud Eid
R4,959 Discovery Miles 49 590 Ships in 18 - 22 working days

Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.

Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback): Diane Barrett,... Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback)
Diane Barrett, Gregory Kipper
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. This book will be a valuable resource for forensic investigators (corporate and law enforcement) and incident response professionals.

Digital Triage Forensics - Processing the Digital Crime Scene (Paperback): Stephen Pearson, Richard Watson Digital Triage Forensics - Processing the Digital Crime Scene (Paperback)
Stephen Pearson, Richard Watson
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF is used by the U.S. Army and other traditional police agencies for current digital forensic applications. The tools, training, and techniques from this practice are being brought to the public in this book for the first time. Now corporations, law enforcement, and consultants can benefit from the unique perspectives of the experts who coined Digital Triage Forensics. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations. This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored. This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.

Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback): Naomi Alpern Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback)
Naomi Alpern
R486 R411 Discovery Miles 4 110 Save R75 (15%) Ships in 10 - 15 working days

The "11th Hour Network+ Study Guide" is keyed to theN10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Five Toughest Questions and answers help you to prepare

The 11th Hour Study Guide Series focuses on just the essentials needed to pass your certification exam and make the most of the last days before the test
The only book keyed to the new 2009 objectives that has beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includesreview of five toughest questions by topic- sure to improve your score"

Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management... Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management (Hardcover, New)
Alan Rea
R4,584 Discovery Miles 45 840 Ships in 18 - 22 working days

Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning, implementing, working within, and managing these promising virtual technologies for secure processes and initiatives. This publication discusses the uses and potential of these virtual technologies and examines secure policy formation and practices that can be applied specifically to each.

Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing (Hardcover): Sunil Kumar, Glenford Mapp,... Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing (Hardcover)
Sunil Kumar, Glenford Mapp, Korhan Cengiz
R3,234 R2,924 Discovery Miles 29 240 Save R310 (10%) Ships in 18 - 22 working days

As enterprise access networks evolve with a larger number of mobile users, a wide range of devices and new cloud-based applications, managing user performance on an end-to-end basis has become rather challenging. Recent advances in big data network analytics combined with AI and cloud computing are being leveraged to tackle this growing problem. AI is becoming further integrated with software that manage networks, storage, and can compute. This edited book focuses on how new network analytics, IoTs and Cloud Computing platforms are being used to ingest, analyse and correlate a myriad of big data across the entire network stack in order to increase quality of service and quality of experience (QoS/QoE) and to improve network performance. From big data and AI analytical techniques for handling the huge amount of data generated by IoT devices, the authors cover cloud storage optimization, the design of next generation access protocols and internet architecture, fault tolerance and reliability in intelligent networks, and discuss a range of emerging applications. This book will be useful to researchers, scientists, engineers, professionals, advanced students and faculty members in ICTs, data science, networking, AI, machine learning and sensing. It will also be of interest to professionals in data science, AI, cloud and IoT start-up companies, as well as developers and designers.

Amazon Redshift Cluster Management Guide (Hardcover): Documentation Team Amazon Redshift Cluster Management Guide (Hardcover)
Documentation Team
R2,196 Discovery Miles 21 960 Ships in 18 - 22 working days
Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New): Ramona Trestian, Gabriel-Miro Muntean Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New)
Ramona Trestian, Gabriel-Miro Muntean
R5,899 Discovery Miles 58 990 Ships in 18 - 22 working days

In the ever-evolving telecommunication industry, technological improvements alone are not able to keep up with the significant growth of mobile broadband traffic. As such, new research on communications networks is necessary to keep up with rising demand. Convergence of Broadband, Broadcast, and Cellular Network Technologies addresses the problems of broadband, broadcast, and cellular coexistence, including the increasing number of advanced mobile users and their bandwidth demands. This book will serve as a link between academia and industry, serving students, researchers, and industry professionals.

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,418 Discovery Miles 14 180 Ships in 10 - 15 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

IT Security Governance Innovations - Theory and Research (Hardcover, New): Daniel Mellado, Luis Enrique Sanchez, Eduardo... IT Security Governance Innovations - Theory and Research (Hardcover, New)
Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.

Amazon Pinpoint Developer Guide (Hardcover): Documentation Team Amazon Pinpoint Developer Guide (Hardcover)
Documentation Team
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R1,965 Discovery Miles 19 650 Ships in 10 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

IPv6 Socket API Extensions: Programmer's Guide (Paperback): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Socket API Extensions: Programmer's Guide (Paperback)
Qing Li, Jinmei Tatuya, Keiichi Shima
R687 Discovery Miles 6 870 Ships in 10 - 15 working days

"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6 application programming intercfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPV6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need know to get up and running with IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6 APIsIncludes extensive line-by-line code sets with meticulous explanations of their implementationNumerous diagrams and illustrations to aid in fully understanding the socket APIs

Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover): Fouad Mohammed Abbou, Hiew Chee... Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover)
Fouad Mohammed Abbou, Hiew Chee Choong
R4,900 Discovery Miles 49 000 Ships in 18 - 22 working days

Data services, especially those involving multimedia applications, can often be bandwidth intensive and accessed simultaneously by a large number of users. As such, efforts are being made to replace conventional network infrastructure, based on copper lines and coaxial cables, with fiber optic networks for improved performance. Optical Transmission and Networks for Next Generation Internet Traffic Highways provides a broader perspective of the parameters involved in the transmission of optical signals using optical soliton systems, OCDM-WDM, SCM-WDM and OTDM-WDM. This timely publication is ideal for use by technical managers, graduate students, engineers and technicians involved in the fiber-optics industry, and scientists working in the field of optical communications.

Infosec Management Fundamentals (Paperback): Henry Dalziel Infosec Management Fundamentals (Paperback)
Henry Dalziel
R1,105 Discovery Miles 11 050 Ships in 10 - 15 working days

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Advancements in Security and Privacy…
Ashwani Kumar, Seelam Sai Satyanarayana Reddy Hardcover R5,924 Discovery Miles 59 240

 

Partners