0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (858)
  • R500+ (13,719)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Safety and Security Engineering VIII (Hardcover): M Guarascio, G. Passerini, F. Garzia, M. Lombardi Safety and Security Engineering VIII (Hardcover)
M Guarascio, G. Passerini, F. Garzia, M. Lombardi
R2,117 Discovery Miles 21 170 Ships in 18 - 22 working days

In its 8th edition the SAFE conference continues to publish important research contributing to the development of the field. The papers included in this volume are the work of engineers, scientists, field researchers, managers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues. Specific themes include: Risk analysis, assessment and management; System safety engineering; Incident monitoring; Information and communication security; Disaster management; Emergency response; Critical infrastructure protection; Counter terrorism issues; Human factors; Transportation safety and security; Modelling and experiments; Security surveillance systems; Loss prevention; BIM in Safety and Security.

Privacy by Design for the Internet of Things - Building accountability and security (Hardcover): Andrew Crabtree, Hamed... Privacy by Design for the Internet of Things - Building accountability and security (Hardcover)
Andrew Crabtree, Hamed Haddadi, Richard Mortier
R3,101 R2,804 Discovery Miles 28 040 Save R297 (10%) Ships in 18 - 22 working days

Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers and socials scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.

Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New): Pedro... Security and Trends in Wireless Identification and Sensing Platform Tags - Advancements in RFID (Hardcover, New)
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Tieyan Li
R4,805 Discovery Miles 48 050 Ships in 18 - 22 working days

Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.

Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover): Actor-Network Theory and Technology Innovation - Advancements and New Concepts (Hardcover)
R4,573 Discovery Miles 45 730 Ships in 18 - 22 working days

About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).

Dynamic Spectrum Management (Hardcover): Ying-Chang Liang Dynamic Spectrum Management (Hardcover)
Ying-Chang Liang
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days
Simulation in Computer Network Design and Modeling - Use and Analysis (Hardcover, New): Hussein Al-Bahadili Simulation in Computer Network Design and Modeling - Use and Analysis (Hardcover, New)
Hussein Al-Bahadili
R4,915 Discovery Miles 49 150 Ships in 18 - 22 working days

Computer networks have become essential to the survival of businesses, organizations, and educational institutions, as the number of network users, services, and applications has increased alongside advancements in information technology. Given this, efforts have been put forward by researchers, designers, managers, analysts, and professionals to optimize network performance and satisfy the varied groups that have an interest in network design and implementation. Simulation in Computer Network Design and Modeling: Use and Analysis reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation. This reference will inform the work and research of academics, post-graduate students, developers, network designers, network analysts, telecommunication system designers, and others who are interested in using simulation in computer network design and modeling.

Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,356 Discovery Miles 103 560 Ships in 18 - 22 working days
Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover): G. Nagarajan, R I Minu Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT (Hardcover)
G. Nagarajan, R I Minu
R7,006 Discovery Miles 70 060 Ships in 18 - 22 working days

Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover): Ioan-Sorin Comsa, Ramona Trestian Next-Generation Wireless Networks Meet Advanced Machine Learning Applications (Hardcover)
Ioan-Sorin Comsa, Ramona Trestian
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,396 Discovery Miles 13 960 Ships in 10 - 15 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

Cloud Computing Service and Deployment Models - Layers and Management (Hardcover, New): Alberto M. Bento, Anil K Aggarwal Cloud Computing Service and Deployment Models - Layers and Management (Hardcover, New)
Alberto M. Bento, Anil K Aggarwal
R4,717 Discovery Miles 47 170 Ships in 18 - 22 working days

Cloud Computing Service and Deployment Models: Layers and Management presents a collection of diverse perspectives on cloud computing and its vital role in all components of organizations. With its intent to benefit practitioners and industry professionals, this book aims to improve the understanding of cloud computing and tackle related concerns such as change management, security, processing approaches, and much more.

Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 1 (Hardcover): Surjit Singh, Rajeev... Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 1 (Hardcover)
Surjit Singh, Rajeev Mohan Sharma
R6,389 Discovery Miles 63 890 Ships in 18 - 22 working days
Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

Amazon Pinpoint Developer Guide (Hardcover): Documentation Team Amazon Pinpoint Developer Guide (Hardcover)
Documentation Team
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Pervasive Cloud Computing Technologies - Future Outlooks and Interdisciplinary Perspectives (Hardcover): Lucio Grandinetti,... Pervasive Cloud Computing Technologies - Future Outlooks and Interdisciplinary Perspectives (Hardcover)
Lucio Grandinetti, Ornella Pisacane, Mehdi Sheikhalishahi
R4,810 Discovery Miles 48 100 Ships in 18 - 22 working days

Technology trends may come and go, but cloud computing technologies have been gaining consideration in the commercial world due to its ability to provide on-demand access to resources, control the software environment, and supplement existing systems. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives explores the latest innovations with cloud computing and the impact of these new models and technologies. This book will present case studies and research on the future of cloud computing technologies and its ability to increase connectivity of various entities of the world. It is an essential resource for technology practitioners, engineers, managers, and academics aiming to gain the knowledge of these novel and pervasive technologies.

Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,325 Discovery Miles 103 250 Ships in 18 - 22 working days
Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management... Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management (Hardcover, New)
Alan Rea
R4,584 Discovery Miles 45 840 Ships in 18 - 22 working days

Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning, implementing, working within, and managing these promising virtual technologies for secure processes and initiatives. This publication discusses the uses and potential of these virtual technologies and examines secure policy formation and practices that can be applied specifically to each.

AWS CodeStar User Guide (Hardcover): Documentation Team AWS CodeStar User Guide (Hardcover)
Documentation Team
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence... Auto-identification and Ubiquitous Computing Applications - RFID and Smart Technologies for Information Convergence (Hardcover)
Judith Symonds, John Ayoade, Dave Parry
R4,939 Discovery Miles 49 390 Ships in 18 - 22 working days

There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.

Seven Deadliest Network Attacks (Paperback): Stacy Prowell, Rob Kraus, Mike Borkin Seven Deadliest Network Attacks (Paperback)
Stacy Prowell, Rob Kraus, Mike Borkin
R576 Discovery Miles 5 760 Ships in 10 - 15 working days

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers.

Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover): Anargyros Chryssanthou,... Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover)
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
R6,136 Discovery Miles 61 360 Ships in 18 - 22 working days

Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.

Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R5,529 Discovery Miles 55 290 Ships in 18 - 22 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover)
Information R Management Association
R11,895 Discovery Miles 118 950 Ships in 18 - 22 working days
Amazon WorkMail Administrator Guide (Hardcover): Documentation Team Amazon WorkMail Administrator Guide (Hardcover)
Documentation Team
R886 Discovery Miles 8 860 Ships in 18 - 22 working days
Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover): Mahmoud Eid Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover)
Mahmoud Eid
R4,959 Discovery Miles 49 590 Ships in 18 - 22 working days

Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on Advancing…
Kamaljeet Sandhu Hardcover R7,484 Discovery Miles 74 840
Booth
Karen Joy Fowler Paperback R463 R260 Discovery Miles 2 600
Bible Verse Jar Prayer Jar Christian…
The London Bookshop Affair
Louise Fein Paperback R304 R281 Discovery Miles 2 810
The Chase - Trusting God With Your…
Kyle Kupecky, Kelsey Kupecky, … Paperback  (3)
R431 Discovery Miles 4 310
We, The Children - The Hidden Language…
Victoria McGuinness Hardcover R686 R610 Discovery Miles 6 100
The Little Liar
Mitch Albom Hardcover R470 R419 Discovery Miles 4 190
Teenagers, Sexual Health Information and…
Kerry Mckellar, Elizabeth Sillence Paperback R2,049 Discovery Miles 20 490
The Tattooist Of Auschwitz
Heather Morris Paperback  (1)
R265 R245 Discovery Miles 2 450
Environment, Our Natural Resources and…
TR DeGregori Hardcover R2,185 Discovery Miles 21 850

 

Partners