0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (328)
  • R250 - R500 (867)
  • R500+ (14,047)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Sustainable Communication Networks and Application - Proceedings of ICSCN 2020 (Hardcover, 1st ed. 2021): P. Karuppusamy,... Sustainable Communication Networks and Application - Proceedings of ICSCN 2020 (Hardcover, 1st ed. 2021)
P. Karuppusamy, Isidoros Perikos, Fuqian Shi, Tu N. Nguyen
R5,728 Discovery Miles 57 280 Ships in 10 - 15 working days

This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.

Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021): Sabu M.... Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021)
Sabu M. Thampi, Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, Kuan-Ching Li
R8,409 Discovery Miles 84 090 Ships in 12 - 17 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R6,256 Discovery Miles 62 560 Ships in 10 - 15 working days
Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R2,717 Discovery Miles 27 170 Ships in 12 - 17 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

Information Warfare (Hardcover): Daniel Ventre Information Warfare (Hardcover)
Daniel Ventre
R4,095 Discovery Miles 40 950 Ships in 10 - 15 working days

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

Data Driven Approach Towards Disruptive Technologies - Proceedings of MIDAS 2020 (Hardcover, 1st ed. 2021): T.P. Singh, Ravi... Data Driven Approach Towards Disruptive Technologies - Proceedings of MIDAS 2020 (Hardcover, 1st ed. 2021)
T.P. Singh, Ravi Tomar, Tanupriya Choudhury, Thinagaran Perumal, Hussain Falih Mahdi
R8,395 Discovery Miles 83 950 Ships in 12 - 17 working days

This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India, during 4-5 September 2020. The book addresses the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like data-driven industrial IoT, bioinformatics, network and security, autonomous computing and various other aligned areas. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber-physical system and smart agriculture. All papers have been carefully reviewed. The book is of interest to computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R6,894 Discovery Miles 68 940 Ships in 10 - 15 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

Selected Readings on Telecommunication and Networking (Hardcover): Jairo Gutierrez Selected Readings on Telecommunication and Networking (Hardcover)
Jairo Gutierrez
R5,321 Discovery Miles 53 210 Ships in 12 - 17 working days

Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.

Planning, Negotiating, Implementing, and Managing Wide Area Networks - A Practical Guide (Hardcover): Luiz Augusto de Carvalho,... Planning, Negotiating, Implementing, and Managing Wide Area Networks - A Practical Guide (Hardcover)
Luiz Augusto de Carvalho, Benjamin Naude
R584 Discovery Miles 5 840 Ships in 12 - 17 working days

Luiz Augusto de Carvalho - WANOPT Wide area network Specialist
Benjamin Naude - Magna international

"Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month."

"The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures."

Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN

Digitalisation and Development - Issues for India and Beyond (Hardcover, 1st ed. 2020): Dibyendu Maiti, Fulvio Castellacci,... Digitalisation and Development - Issues for India and Beyond (Hardcover, 1st ed. 2020)
Dibyendu Maiti, Fulvio Castellacci, Arne Melchior
R1,720 Discovery Miles 17 200 Ships in 10 - 15 working days

This book investigates the impact of information and communication technologies (ICTs) on development and well-being (beyond economic benefits) and highlights some emerging issues relating to the realities, constraints and digital divides with particular reference to India. It collects a series of novel contributions, studying the Indian experience in an international cross-country perspective. The book also discusses economic, social, and behavioural aspects of well-being as well as access to ICTs across regions, states and individuals to account for the digital divide. The book establishes an aggregate relationship between ICT exposure and well-being at the country level and addresses a number of fundamental issues, such as whether ICT raises the level of transparency and governance. Based on case studies and anecdotal evidence, it then further assesses the effective implementation of service delivery through ICT innovations. The book is divided into four parts: The introductory part surveys the literature and presents background information on the Indian case; introduces the main themes on the relationships between ICT, socio-economic development and digital divides; and provides a summary and roadmap to the chapters of the book. Part II focuses on the impact of ICT on economic performance, including economic growth, productivity and trade. Part III examines the extent of the digital divides in India, including international, regional as well as inter-personal inequality. Finally, Part IV investigates the impact of ICT on governance, users' well-being and social outcomes. Combining insights from analyses of a variety of socio-economic dimensions related to digitalisation, this book is relevant for a wide range of scholars and researchers across disciplines, as well as practitioners and policy-makers. While the book has a main focus on India, various contributions take an international cross-country comparative perspective, and the results have general relevance for digitalisation and development. On the whole, the main message of this book is that the impact of ICTs is contingent upon other assets, capabilities and institutional conditions. National policies should, therefore, not only promote digitalization as such but also ensure its co-evolution and complementarity with a variety of other country-specific factors. Chapter 'Digitalisation and Development: Issues for India and Beyond' of this book is available open access under a CC BY 4.0 license at link.springer.com

Advanced Methods for Complex Network Analysis (Hardcover): Natarajan Meghanathan Advanced Methods for Complex Network Analysis (Hardcover)
Natarajan Meghanathan
R5,851 Discovery Miles 58 510 Ships in 12 - 17 working days

As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.

Hackers and Hacking - A Reference Handbook (Hardcover, New): Thomas J. Holt, Bernadette H Schell Hackers and Hacking - A Reference Handbook (Hardcover, New)
Thomas J. Holt, Bernadette H Schell
R2,262 R1,986 Discovery Miles 19 860 Save R276 (12%) Ships in 12 - 17 working days

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

Amazon Elastic Compute Cloud User Guide for Linux Instances (Hardcover): Documentation Team Amazon Elastic Compute Cloud User Guide for Linux Instances (Hardcover)
Documentation Team
R3,165 Discovery Miles 31 650 Ships in 10 - 15 working days
Amazon Simple Email Service Developer Guide (Hardcover): Documentation Team Amazon Simple Email Service Developer Guide (Hardcover)
Documentation Team
R2,489 Discovery Miles 24 890 Ships in 10 - 15 working days
Surviving Cyberwar (Paperback): Richard Stiennon Surviving Cyberwar (Paperback)
Richard Stiennon
R1,413 Discovery Miles 14 130 Ships in 12 - 17 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover)
Information R Management Association
R12,908 Discovery Miles 129 080 Ships in 10 - 15 working days
Security-Aware Systems Applications and Software Development Methods (Hardcover, New): Khaled M Khan Security-Aware Systems Applications and Software Development Methods (Hardcover, New)
Khaled M Khan
R5,312 Discovery Miles 53 120 Ships in 12 - 17 working days

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.

Edge Computing - Models, Technologies and Applications (Hardcover): Javid Taheri, Shuiguang Deng Edge Computing - Models, Technologies and Applications (Hardcover)
Javid Taheri, Shuiguang Deng
R4,003 R3,605 Discovery Miles 36 050 Save R398 (10%) Ships in 10 - 15 working days
Context-aware Mobile and Ubiquitous Computing for Enhanced Usability - Adaptive Technologies and Applications (Hardcover):... Context-aware Mobile and Ubiquitous Computing for Enhanced Usability - Adaptive Technologies and Applications (Hardcover)
Dragan Stojanovic
R5,320 Discovery Miles 53 200 Ships in 12 - 17 working days

Advances in mobile computing, wireless communications, mobile positioning, and sensor technologies have given rise to a new class of context-aware mobile and ubiquitous applications. ""Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive Technologies and Applications"" provides thorough insights and significant research developments on mobile technologies and services. This significant reference book explains how users of such applications access intelligent and adaptable information services, maximizing convenience and minimizing intrusion.

Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition): R. Anderson Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition)
R. Anderson
R1,447 R1,328 Discovery Miles 13 280 Save R119 (8%) Ships in 12 - 17 working days

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?

AWS Directory Service Administration Guide (Hardcover): Documentation Team AWS Directory Service Administration Guide (Hardcover)
Documentation Team
R1,826 Discovery Miles 18 260 Ships in 10 - 15 working days
Computer Security Threats (Hardcover): Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernandez-Carames Computer Security Threats (Hardcover)
Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernandez-Carames
R3,315 Discovery Miles 33 150 Ships in 10 - 15 working days
Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24,... Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Sune Von Solms
R2,582 Discovery Miles 25 820 Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 14th IFIP WG 11.8 World Conference on Information Security Education, WISE 14, held virtually in June 2021. The 8 papers presented together with a special chapter showcasing the history of WISE and two workshop papers were carefully reviewed and selected from 19 submissions. The papers are organized in the following topical sections: a roadmap for building resilience; innovation in curricula; teaching methods and tools; and end-user security.

Coding Theory (Hardcover): Sudhakar Radhakrishnan, Muhammad Sarfraz Coding Theory (Hardcover)
Sudhakar Radhakrishnan, Muhammad Sarfraz
R3,352 Discovery Miles 33 520 Ships in 10 - 15 working days
Blockchain Technology and Innovations in Business Processes (Hardcover, 1st ed. 2021): Srikanta Patnaik, Tao-Sheng Wang, Tao... Blockchain Technology and Innovations in Business Processes (Hardcover, 1st ed. 2021)
Srikanta Patnaik, Tao-Sheng Wang, Tao Shen, Sushanta Kumar Panigrahi
R5,062 Discovery Miles 50 620 Ships in 12 - 17 working days

This edited book provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness. The book presents original unpublished research papers on blockchain technology and business management on novel architectures, prototypes and case studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multipactor in Accelerating Cavities
Valery D. Shemelin, Sergey A. Belomestnykh Hardcover R4,067 Discovery Miles 40 670
Group Statements: Volume 1…
Paperback R1,258 R1,155 Discovery Miles 11 550
Fidel Castro - A Captivating Guide to a…
Captivating History Hardcover R709 R625 Discovery Miles 6 250
Contemporary Trends and Challenges in…
Krzysztof Jajuga, Lucjan T. Orlowski, … Hardcover R5,987 R4,830 Discovery Miles 48 300
De Jagers In Die Dorsland
Nicol Stassen Hardcover R484 Discovery Miles 4 840
End of the Rainbow - A Memoir of a…
Valerie Dawn Hardcover R614 Discovery Miles 6 140
Microstrip Lines And Slotlines
K.C. Gupta, R. Garg, … Hardcover R4,334 Discovery Miles 43 340
Atomic-Scale Electronics Beyond CMOS
Mircea Dragoman, Daniela Dragoman Hardcover R5,060 Discovery Miles 50 600
American Poultry World, Vol. 1: November…
Grant M. Curtis Paperback R400 Discovery Miles 4 000
Pittsburgh'S Lost Outpost - Captain…
Jason A. Cherry Paperback R557 R517 Discovery Miles 5 170

 

Partners