0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (342)
  • R250 - R500 (941)
  • R500+ (16,424)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Internet of Things and Big Data Analytics - Integrated Platforms and Industry Use Cases (Hardcover): Pethuru Raj,... The Internet of Things and Big Data Analytics - Integrated Platforms and Industry Use Cases (Hardcover)
Pethuru Raj, Balamurugan Balusamy, Manju Khari, T Poongodi
R2,278 Discovery Miles 22 780 Ships in 9 - 15 working days

This book comprehensively conveys the theoretical and practical aspects of IoT and big data analytics with the solid contributions from practitioners as well as academicians. This book examines and expounds the unique capabilities of the big data analytics platforms in capturing, cleansing and crunching IoT device/sensor data in order to extricate actionable insights. A number of experimental case studies and real-world scenarios are incorporated in this book in order to instigate our book readers. This book Analyzes current research and development in the domains of IoT and big data analytics Gives an overview of latest trends and transitions happening in the IoT data analytics space Illustrates the various platforms, processes, patterns, and practices for simplifying and streamlining IoT data analytics The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases examines and accentuates how the multiple challenges at the cusp of IoT and big data can be fully met. The device ecosystem is growing steadily. It is forecast that there will be billions of connected devices in the years to come. When these IoT devices, resource-constrained as well as resource-intensive, interact with one another locally and remotely, the amount of multi-structured data generated, collected, and stored is bound to grow exponentially. Another prominent trend is the integration of IoT devices with cloud-based applications, services, infrastructures, middleware solutions, and databases. This book examines the pioneering technologies and tools emerging and evolving in order to collect, pre-process, store, process and analyze data heaps in order to disentangle actionable insights.

Official Google Cloud Certified Professional Data Engineer Study Guide (Paperback): D. Sullivan Official Google Cloud Certified Professional Data Engineer Study Guide (Paperback)
D. Sullivan
R1,421 R1,087 Discovery Miles 10 870 Save R334 (24%) Ships in 7 - 13 working days

The proven Study Guide that prepares you for this new Google Cloud exam The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Professional Data Engineer certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Google Cloud Certified Professional Data Engineer Study Guide is your ace in the hole for deploying and managing analytics and machine learning applications. Build and operationalize storage systems, pipelines, and compute infrastructure Understand machine learning models and learn how to select pre-built models Monitor and troubleshoot machine learning models Design analytics and machine learning applications that are secure, scalable, and highly available. This exam guide is designed to help you develop an in depth understanding of data engineering and machine learning on Google Cloud Platform.

How Things Work - The Technology Edition (Hardcover): Charles F. Bowman How Things Work - The Technology Edition (Hardcover)
Charles F. Bowman
R3,632 Discovery Miles 36 320 Ships in 12 - 17 working days

* Provides simple, conceptual descriptions of everyday technologies * Includes clear examples and diagrams that demonstrate the principles and techniques, not just a "how-to" punch list * Covers advanced topics for readers who want to dive into the deep end of the technology pool * Avoids jargon-where terminology does appear, the text will provide clear, concise definitions

Nine Steps to Success: An ISO 27001 Implementation Overview (Paperback, 3rd ed.): It Governance Publishing Nine Steps to Success: An ISO 27001 Implementation Overview (Paperback, 3rd ed.)
It Governance Publishing
R904 Discovery Miles 9 040 Ships in 12 - 17 working days
(ISC)2 SSCP Systems Security Certified Practitione r Official Study Guide, 3rd Edition (Paperback, 3rd Edition): M. Wills (ISC)2 SSCP Systems Security Certified Practitione r Official Study Guide, 3rd Edition (Paperback, 3rd Edition)
M. Wills
R1,099 Discovery Miles 10 990 Ships in 12 - 17 working days

The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. This comprehensive Official Study Guide--the only study guide officially approved by (ISC)2--covers all objectives of the seven SSCP domains. Security Operations and Administration Access Controls Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security This updated Third Edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.

Cross-Site Scripting Attacks - Classification, Attack, and Countermeasures (Paperback): Bb Gupta, Pooja Chaudhary Cross-Site Scripting Attacks - Classification, Attack, and Countermeasures (Paperback)
Bb Gupta, Pooja Chaudhary
R640 Discovery Miles 6 400 Ships in 12 - 17 working days

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R596 Discovery Miles 5 960 Ships in 12 - 17 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,185 Discovery Miles 31 850 Ships in 12 - 17 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Unwired - Gaining Control over Addictive Technologies (Hardcover): Gaia Bernstein Unwired - Gaining Control over Addictive Technologies (Hardcover)
Gaia Bernstein
R608 R495 Discovery Miles 4 950 Save R113 (19%) Ships in 9 - 15 working days

Our society has a technology problem. Many want to disconnect from screens but can't help themselves. These days we spend more time online than ever. Some turn to self-help-measures to limit their usage, yet repeatedly fail, while parents feel particularly powerless to help their children. Unwired: Gaining Control over Addictive Technologies shows us a way out. Rather than blaming users, the book shatters the illusion that we autonomously choose how to spend our time online. It shifts the moral responsibility and accountability for solutions to corporations. Drawing lessons from the tobacco and food industries, the book demonstrates why government regulation is necessary to curb technology addiction. It describes a grassroots movement already in action across courts and legislative halls. Groundbreaking and urgent, Unwired provides a blueprint to develop this movement for change, to one that will allow us to finally gain control.

Machine Learning, Blockchain, and Cyber Security in  Smart Environments - Application and Challenges (Hardcover): Sarvesh... Machine Learning, Blockchain, and Cyber Security in Smart Environments - Application and Challenges (Hardcover)
Sarvesh Tanwar, Sumit Badotra, Ajay Rana
R3,918 Discovery Miles 39 180 Ships in 12 - 17 working days

Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation. The book focuses on the benefits related to the emerging applications such as machine learning, blockchain and cyber security. Key Features: Introduces the latest trends in the fields of machine learning, blockchain and cyber security Discusses the fundamentals, challenges and architectural overviews with concepts Explores recent advancements in machine learning, blockchain, and cyber security Examines recent trends in emerging technologies This book is primarily aimed at graduates, researchers, and professionals working in the areas of machine learning, blockchain, and cyber security.

Management of Organizational Culture as a Stabilizer of Changes - Organizational Culture Management Dilemmas (Paperback):... Management of Organizational Culture as a Stabilizer of Changes - Organizational Culture Management Dilemmas (Paperback)
Ibrahiem M.M.El Emary, Anna Brzozowska, Dagmara Bubel
R1,401 Discovery Miles 14 010 Ships in 12 - 17 working days

Unique selling point:* Focuses on the relationship between organizational culture and change effectiveness with a focus on communication systemsCore audience:* Intended for IT and business management professionals Place in the market:* Will go alongside the main author's other books to give a full picture of IT systems being utilised within business management

Security Analytics for the Internet of Everything (Paperback): Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan Security Analytics for the Internet of Everything (Paperback)
Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan
R1,427 Discovery Miles 14 270 Ships in 12 - 17 working days

Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.

Multi-Access Edge Computing in Action (Paperback): Dario Sabella, Alex Reznik, Rui Frazao Multi-Access Edge Computing in Action (Paperback)
Dario Sabella, Alex Reznik, Rui Frazao
R1,414 Discovery Miles 14 140 Ships in 12 - 17 working days

This book provides a complete and strategic overview of Multi-Access Edge Computing (MEC). It covers network and technology aspects, describes the market scenarios from the different stakeholders' point of view, and analyzes deployment aspects and actions to engage the ecosystem. MEC exists in and supports a highly complex "5G world" in which technologists and non-technology decision makers must act in concert and do so within a large interconnected ecosystem of which MEC is just one, albeit an important, part. Divided into three sections, with several chapters in each, the book addresses these three key aspects: technology, markets, and ecosystems.

Drones in IoT-enabled Spaces (Paperback): Fadi Al-Turjman Drones in IoT-enabled Spaces (Paperback)
Fadi Al-Turjman
R1,406 Discovery Miles 14 060 Ships in 12 - 17 working days

The Internet of Things (IoT) is a system of inter-connected devices, objects, and organisms. Among these devices, drones are gaining lots of interest. Drones are expected to communicate with cellular networks in the next generation networks (5G and beyond) which opens the door for another exciting research area. This book considers very important research areas in drone and cellular networks. It addresses major issues and challenges in drone-based solutions proposed for IoT-enabled cellular/computer networks, routing/communication protocols, surveillances applications, secured data management, and positioning approaches. It focuses mainly on smart and context-aware implementations.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Cybersecurity and Privacy in Cyber Physical Systems (Paperback): Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim... Cybersecurity and Privacy in Cyber Physical Systems (Paperback)
Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq
R1,427 Discovery Miles 14 270 Ships in 12 - 17 working days

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader's awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.

User-Centric and Information-Centric Networking and Services - Access Networks, Storage and Cloud Perspective (Paperback): M.... User-Centric and Information-Centric Networking and Services - Access Networks, Storage and Cloud Perspective (Paperback)
M. Bala Krishna
R1,414 Discovery Miles 14 140 Ships in 12 - 17 working days

User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency of content delivery and also content availability. In this new concept, the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of UCN and ICN, describes the main architecture proposals for these networks, and discusses the main challenges to their development. The book also looks at the current challenges for this concept, including naming, routing and caching on the network-core elements, several aspects of content security, user privacy, and practical issues in implementing UCN and ICN.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,280 Discovery Miles 12 800 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Internet of Things and Data Mining for Modern Engineering and Healthcare Applications (Hardcover): Ankan Bhattacharya,... Internet of Things and Data Mining for Modern Engineering and Healthcare Applications (Hardcover)
Ankan Bhattacharya, Bappadittya Roy, Samarendra Nath Sur, Saurav Mallik, Subhasis Dasgupta
R3,485 Discovery Miles 34 850 Ships in 12 - 17 working days

This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted

Security in the Digital World (Paperback): IT Governance Security in the Digital World (Paperback)
IT Governance
R481 Discovery Miles 4 810 Ships in 12 - 17 working days
Hands-On Microsoft (R) Windows Server 2019 (Paperback, 3rd edition): Jason Eckert Hands-On Microsoft (R) Windows Server 2019 (Paperback, 3rd edition)
Jason Eckert
R1,324 R1,190 Discovery Miles 11 900 Save R134 (10%) Ships in 10 - 15 working days

Eckert's HANDS-ON MICROSOFT (R) WINDOWS (R) SERVER 2019 equips you with a solid foundation in basic server administration -- no prior experience required. It empowers you with the knowledge to manage servers on small to large networks and maximize Windows (R) Server 2019 administration. Using a logical topic flow and step-by-step exercises, it delivers thorough coverage of core Windows (R) Server 2019 features. You will learn how to deploy Windows (R) Server 2019 in a variety of different environments -- including those that rely on virtualization and containers -- and how to configure and manage server storage, troubleshoot performance issues and work with common Windows (R) Server technologies and network services, such as Active Directory, DNS, DHCP, IPAM, file sharing, printing and remote access. Numerous hands-on projects and MindTap activities enable you to put what you learn into real-world practice.

Internet of Things and the Law - Legal Strategies for Consumer-Centric Smart Technologies (Hardcover): Guido Noto La Diega Internet of Things and the Law - Legal Strategies for Consumer-Centric Smart Technologies (Hardcover)
Guido Noto La Diega
R3,805 Discovery Miles 38 050 Ships in 12 - 17 working days

Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power - and the increasing significance of their disembodied counterparts - has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital 'offline' technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the return of data, knowledge, and power within a physical 'smart' world. This development frames the book's central question: can the law steer rematerialisation in a human-centric and socially just direction? To answer it, the book focuses on the IoT, the sociotechnological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against 'smart' capitalism.

Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback)
Mai Helmy Shaheen
R1,268 Discovery Miles 12 680 Ships in 12 - 17 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,117 Discovery Miles 11 170 Ships in 12 - 17 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

Confident Cyber Security - The Essential Insights and How to Protect from Threats (Paperback, 2nd Revised edition): Jessica... Confident Cyber Security - The Essential Insights and How to Protect from Threats (Paperback, 2nd Revised edition)
Jessica Barker
R464 R376 Discovery Miles 3 760 Save R88 (19%) Ships in 12 - 17 working days

The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Engineering - A Guide to…
R. Anderson Hardcover R1,719 R1,320 Discovery Miles 13 200
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,036 Discovery Miles 10 360
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
Guide to Networking Essentials
Greg Tomsho Paperback R1,337 R1,199 Discovery Miles 11 990
AWS Certified Security Study Guide…
Santana Paperback R1,422 R1,088 Discovery Miles 10 880
Building Microservices
Sam Newman Paperback R1,212 Discovery Miles 12 120
CEH v12 Certified Ethical Hacker Study…
Ric Messier Paperback R1,327 Discovery Miles 13 270
The Gathering Cloud
J. R. Carpenter Paperback R378 Discovery Miles 3 780

 

Partners