0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (858)
  • R500+ (13,712)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback): Diane Barrett,... Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback)
Diane Barrett, Gregory Kipper
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. This book will be a valuable resource for forensic investigators (corporate and law enforcement) and incident response professionals.

Digital Triage Forensics - Processing the Digital Crime Scene (Paperback): Stephen Pearson, Richard Watson Digital Triage Forensics - Processing the Digital Crime Scene (Paperback)
Stephen Pearson, Richard Watson
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF is used by the U.S. Army and other traditional police agencies for current digital forensic applications. The tools, training, and techniques from this practice are being brought to the public in this book for the first time. Now corporations, law enforcement, and consultants can benefit from the unique perspectives of the experts who coined Digital Triage Forensics. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations. This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored. This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.

Amazon Redshift Cluster Management Guide (Hardcover): Documentation Team Amazon Redshift Cluster Management Guide (Hardcover)
Documentation Team
R2,196 Discovery Miles 21 960 Ships in 18 - 22 working days
Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New): Ramona Trestian, Gabriel-Miro Muntean Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New)
Ramona Trestian, Gabriel-Miro Muntean
R5,899 Discovery Miles 58 990 Ships in 18 - 22 working days

In the ever-evolving telecommunication industry, technological improvements alone are not able to keep up with the significant growth of mobile broadband traffic. As such, new research on communications networks is necessary to keep up with rising demand. Convergence of Broadband, Broadcast, and Cellular Network Technologies addresses the problems of broadband, broadcast, and cellular coexistence, including the increasing number of advanced mobile users and their bandwidth demands. This book will serve as a link between academia and industry, serving students, researchers, and industry professionals.

Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover): Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover)
R4,604 Discovery Miles 46 040 Ships in 18 - 22 working days

The increasing reliance upon networking and mobile networking devices in the modern world demands constant improvement of network Quality of Service (QoS). Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication explores the interrelated natures of network control mechanisms and QoS and offers fundamental knowledge on the subject, describing the significance of network management and the integration of knowledge to demonstrate how network management is related to QoS in real applications. Engaging and innovative, this book provides practical solutions that integrate network management and QoS strategies for real-world application.

Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing (Hardcover): Sunil Kumar, Glenford Mapp,... Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing (Hardcover)
Sunil Kumar, Glenford Mapp, Korhan Cengiz
R3,234 R2,924 Discovery Miles 29 240 Save R310 (10%) Ships in 18 - 22 working days

As enterprise access networks evolve with a larger number of mobile users, a wide range of devices and new cloud-based applications, managing user performance on an end-to-end basis has become rather challenging. Recent advances in big data network analytics combined with AI and cloud computing are being leveraged to tackle this growing problem. AI is becoming further integrated with software that manage networks, storage, and can compute. This edited book focuses on how new network analytics, IoTs and Cloud Computing platforms are being used to ingest, analyse and correlate a myriad of big data across the entire network stack in order to increase quality of service and quality of experience (QoS/QoE) and to improve network performance. From big data and AI analytical techniques for handling the huge amount of data generated by IoT devices, the authors cover cloud storage optimization, the design of next generation access protocols and internet architecture, fault tolerance and reliability in intelligent networks, and discuss a range of emerging applications. This book will be useful to researchers, scientists, engineers, professionals, advanced students and faculty members in ICTs, data science, networking, AI, machine learning and sensing. It will also be of interest to professionals in data science, AI, cloud and IoT start-up companies, as well as developers and designers.

Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback): Naomi Alpern Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback)
Naomi Alpern
R486 R411 Discovery Miles 4 110 Save R75 (15%) Ships in 10 - 15 working days

The "11th Hour Network+ Study Guide" is keyed to theN10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Five Toughest Questions and answers help you to prepare

The 11th Hour Study Guide Series focuses on just the essentials needed to pass your certification exam and make the most of the last days before the test
The only book keyed to the new 2009 objectives that has beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includesreview of five toughest questions by topic- sure to improve your score"

Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover): Wen-Chen Hu Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover)
Wen-Chen Hu
R5,018 Discovery Miles 50 180 Ships in 18 - 22 working days

Education and research in the field of electronic commerce technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Electronic Commerce Technologies: Contemporary Applications supplements course instruction and student research with quality articles focused on key issues concerning the technologies and applications of electronic commerce. Containing over 30 chapters from authors across the globe, these selected readings in areas such as e-marketing, IT business, and mobile commerce depict the most relevant and important areas of classroom discussion within the categories of fundamental concepts and theories; development and design methodologies; tools and technologies; application and utilization; critical issues; and emerging trends.

Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover): Fouad Mohammed Abbou, Hiew Chee... Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover)
Fouad Mohammed Abbou, Hiew Chee Choong
R4,900 Discovery Miles 49 000 Ships in 18 - 22 working days

Data services, especially those involving multimedia applications, can often be bandwidth intensive and accessed simultaneously by a large number of users. As such, efforts are being made to replace conventional network infrastructure, based on copper lines and coaxial cables, with fiber optic networks for improved performance. Optical Transmission and Networks for Next Generation Internet Traffic Highways provides a broader perspective of the parameters involved in the transmission of optical signals using optical soliton systems, OCDM-WDM, SCM-WDM and OTDM-WDM. This timely publication is ideal for use by technical managers, graduate students, engineers and technicians involved in the fiber-optics industry, and scientists working in the field of optical communications.

IPv6 Socket API Extensions: Programmer's Guide (Paperback): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Socket API Extensions: Programmer's Guide (Paperback)
Qing Li, Jinmei Tatuya, Keiichi Shima
R687 Discovery Miles 6 870 Ships in 10 - 15 working days

"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6 application programming intercfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPV6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need know to get up and running with IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6 APIsIncludes extensive line-by-line code sets with meticulous explanations of their implementationNumerous diagrams and illustrations to aid in fully understanding the socket APIs

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R1,965 Discovery Miles 19 650 Ships in 10 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,418 Discovery Miles 14 180 Ships in 10 - 15 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

Amazon Connect User Guide (Hardcover): Documentation Team Amazon Connect User Guide (Hardcover)
Documentation Team
R885 Discovery Miles 8 850 Ships in 18 - 22 working days
Developing and Evaluating Security-Aware Software Systems (Hardcover): Khaled M Khan Developing and Evaluating Security-Aware Software Systems (Hardcover)
Khaled M Khan
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Networking, Models and Methods of Cloud Computing (Hardcover): Michel Levine Networking, Models and Methods of Cloud Computing (Hardcover)
Michel Levine
R3,287 R2,977 Discovery Miles 29 770 Save R310 (9%) Ships in 18 - 22 working days
Advanced Methods for Complex Network Analysis (Hardcover): Natarajan Meghanathan Advanced Methods for Complex Network Analysis (Hardcover)
Natarajan Meghanathan
R5,473 Discovery Miles 54 730 Ships in 18 - 22 working days

As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.

Multi-Camera Networks - Principles and Applications (Hardcover): Hamid Aghajan, Andrea Cavallaro Multi-Camera Networks - Principles and Applications (Hardcover)
Hamid Aghajan, Andrea Cavallaro
R2,717 Discovery Miles 27 170 Ships in 10 - 15 working days

The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware

This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures, embedded processing, sensor fusion and middleware, calibration and topology, network-based detection and tracking, and applications in distributed and collaborative methods in camera networks. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate students working in signal and video processing, computer vision, and sensor networks.

Hamid Aghajan is a Professor of Electrical Engineering (consulting) at Stanford University. His research is on multi-camera networks for smart environments with application to smart homes, assisted living and well being, meeting rooms, and avatar-based communication and social interactions. He is Editor-in-Chief of Journal of Ambient Intelligence and Smart Environments, and was general chair of ACM/IEEE ICDSC 2008.

Andrea Cavallaro is Reader (Associate Professor) at Queen Mary, University of London (QMUL). His research is on target tracking and audiovisual content analysis for advanced surveillance and multi-sensor systems. He serves as Associate Editor of the IEEE Signal Processing Magazine and the IEEE Trans. on Multimedia, and has been general chair of IEEE AVSS 2007, ACM/IEEE ICDSC 2009 and BMVC 2009.
The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware"

Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New): Dale Liu Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New)
Dale Liu
R1,300 Discovery Miles 13 000 Ships in 10 - 15 working days

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail.
Cisco Router and Switch Forensics is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points.
Why is this focus on network devices necessary? Because criminals are targeting networks, and network devices require a fundamentally different approach than the process taken with traditional forensics. By hacking a router, an attacker can bypass a network's firewalls, issue a denial of service (DoS) attack to disable the network, monitor and record all outgoing and incoming traffic, or redirect that communication anywhere they like. But capturing this criminal activity cannot be accomplished with the tools and techniques of traditional forensics. While forensic analysis of computers or other traditional media typically involves immediate shut-down of the target machine, creation of a duplicate, and analysis of static data, this process rarely recovers live system data. So, when an investigation focuses on live network activity, this traditional approach obviously fails. Investigators must recover data as it is transferred via the router or switch, because it is destroyed when the network device is powered down. In this case, following the traditional approach outlined in books on general computer forensics techniques is not only insufficient, but also essentially harmful to an investigation.
Jargon buster: A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). A router is a more sophisticated network device that joins multiple wired or wireless networks together.
* The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet
* Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity
* Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony

Information Warfare (Hardcover): Daniel Ventre Information Warfare (Hardcover)
Daniel Ventre
R3,778 Discovery Miles 37 780 Ships in 18 - 22 working days

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

Security-Aware Systems Applications and Software Development Methods (Hardcover, New): Khaled M Khan Security-Aware Systems Applications and Software Development Methods (Hardcover, New)
Khaled M Khan
R4,967 Discovery Miles 49 670 Ships in 18 - 22 working days

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.

Deploying QoS for Cisco IP and Next Generation Networks - The Definitive Guide (Hardcover): Vinod Joseph, Brett Chapman Deploying QoS for Cisco IP and Next Generation Networks - The Definitive Guide (Hardcover)
Vinod Joseph, Brett Chapman
R1,347 Discovery Miles 13 470 Ships in 10 - 15 working days

"Deploying QoS for IP Next Generation Networks: The Definitive Guide" provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data applications creating a converged infrastructure. It further provides detailed design and implementation details for various service deployments across the various Cisco platforms such as the CRS-1, 12000, 7600 & 7200 series routers that are widely deployed in most Carrier Networks.
The book covers architectural and implementation specific information plus recommendations for almost all the popular line cards across the various hardware platforms widely used in the market. It also addresses QoS architecture and deployment on the Cisco CRS-1 platform and is considered as a unique selling point of this book.
In short the books serve as an "On the Job Manual" which can also be used as a study guide for Cisco specialist certification programs (CCNA, CCIP, CCIE)
This book will includes detailed illustration and configurations. In addition, it provides detailed case studies along with platform specific tests and measurement results. A link to a detailed tutorial on QoS metrics and associated test results will be available at the book's companion website in order to ensure that the reader is able to understand QoS functionality from a deployment standpoint.
Covers the requirements and solutions in deploying QoS for voice, video, IPTV, mobility and data traffic classes (Quad-play networks), saving the reader time in searching for hardware specific QoS information, given the abundance of Cisco platforms and line cards.Presents real-life deployments by means of detailed case studies, allowing the reader to apply the same solutions to situations in the work place.Provides QoS architecture and implementation details on Cisco CRS-1, 12000, 7600, and 7200 routing platforms using Cisco IOS/IOS-XR software, aiding the reader in using these devices and preparing for Cisco specialist certification.

Edge Computing - Models, Technologies and Applications (Hardcover): Javid Taheri, Shuiguang Deng Edge Computing - Models, Technologies and Applications (Hardcover)
Javid Taheri, Shuiguang Deng
R3,687 R3,326 Discovery Miles 33 260 Save R361 (10%) Ships in 18 - 22 working days
Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New): Gianluca Cornetta, David J Santos,... Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New)
Gianluca Cornetta, David J Santos, Jose Manuel Vazquez
R4,943 Discovery Miles 49 430 Ships in 18 - 22 working days

Radio-frequency (RF) integrated circuits in CMOS technology are gaining increasing popularity in the commercial world, and CMOS technology has become the dominant technology for applications such as GPS receivers, GSM cellular transceivers, wireless LAN, and wireless short-range personal area networks based on IEEE 802.15.1 (Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the increasing interest in wireless technologies and the widespread of wireless communications has prompted an ever increasing demand for radio frequency transceivers. Wireless Radio-Frequency Standards and System Design: Advanced Techniques provides perspectives on radio-frequency circuit and systems design, covering recent topics and developments in the RF area. Exploring topics such as LNA linearization, behavioral modeling and co-simulation of analog and mixed-signal complex blocks for RF applications, integrated passive devices for RF-ICs and baseband design techniques and wireless standards, this is a comprehensive reference for students as well as practicing professionals.

Enabling Blockchain Technology for Secure Networking and Communications (Hardcover): Adel Ben Mnaouer, Lamia Chaari Fourati Enabling Blockchain Technology for Secure Networking and Communications (Hardcover)
Adel Ben Mnaouer, Lamia Chaari Fourati
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.

Amazon Simple Queue Service Developer Guide (Hardcover): Documentation Team Amazon Simple Queue Service Developer Guide (Hardcover)
Documentation Team
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Hacking - Computer Hacking for…
Adam Dodson Hardcover R546 R500 Discovery Miles 5 000
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140

 

Partners