0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover)
Edmond K. Machie
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Large-Scale Data Streaming, Processing, and Blockchain Security (Hardcover): Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini Large-Scale Data Streaming, Processing, and Blockchain Security (Hardcover)
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
R6,163 Discovery Miles 61 630 Ships in 18 - 22 working days

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.

Network Science - Theory and Applications (Hardcover): T.G. Lewis Network Science - Theory and Applications (Hardcover)
T.G. Lewis
R3,647 Discovery Miles 36 470 Ships in 18 - 22 working days

A comprehensive look at the emerging science of networks

Network science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people.

This is the first book to take a comprehensive look at this emerging science. It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk. The book's uniqueness lies in its integration of concepts across computer science, biology, physics, social network analysis, economics, and marketing.

The book is divided into easy-to-understand topical chapters and the presentation is augmented with clear illustrations, problems and answers, examples, applications, tutorials, and a discussion of related Java software. Chapters cover:

Origins

Graphs

Regular Networks

Random Networks

Small-World Networks

Scale-Free Networks

Emergence

Epidemics

Synchrony

Influence Networks

Vulnerability

Net Gain

Biology

This book offers a new understanding and interpretation of the field of network science. It is an indispensable resource for researchers, professionals, and technicians in engineering, computing, and biology. It also serves as a valuable textbook for advanced undergraduate and graduate courses in related fields of study.

Computer Networking (Hardcover): Paxton Byrne Computer Networking (Hardcover)
Paxton Byrne
R3,055 R2,770 Discovery Miles 27 700 Save R285 (9%) Ships in 18 - 22 working days
Dictionary of Information Security (Paperback): Robert Slade Dictionary of Information Security (Paperback)
Robert Slade
R659 R540 Discovery Miles 5 400 Save R119 (18%) Ships in 10 - 15 working days

The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.
IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.
* Your one stop shop coverage of malware, wireless technologies, and phishing
*An easy to use tol featuring the ability to cross references makeing navigation easy
* Includes special coverage of military and government terms for the latest hot topics

Amazon Simple Queue Service Developer Guide (Hardcover): Documentation Team Amazon Simple Queue Service Developer Guide (Hardcover)
Documentation Team
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days
Handbook of Research on Social Media Applications for the Tourism and Hospitality Sector (Hardcover): Celia M. Q. Ramos,... Handbook of Research on Social Media Applications for the Tourism and Hospitality Sector (Hardcover)
Celia M. Q. Ramos, Claudia Ribeiro De Almeida, Paula Odete Fernandes
R8,124 Discovery Miles 81 240 Ships in 18 - 22 working days

Tourists frequently rely on social networks to provide information about a product or destination as a decision support tool to make adequate decisions in the process of planning a trip. In this digital environment, tourists share their travel experiences, impressions, emotions, special moments, and opinions about an assortment of tourist services like hotels, restaurants, airlines, and car rental services, all of which contribute to the online reputation of a tourist destination. The Handbook of Research on Social Media Applications for the Tourism and Hospitality Sector is a fundamental reference source that provides vital theoretical frameworks and the latest innovative empirical research findings of online social media in the tourism industry. While highlighting topics such as e-business, mobile marketing, and smart tourism, this publication explores user-generated content and the methods of mobile strategies. This book is ideally designed for tour developers, travel agents, restaurateurs, hotel management, tour directors, entrepreneurs, social media analysts, managers, industry professionals, academicians, researchers, and students.

Cryptography and Security in Computing (Hardcover): Jaydip Sen Cryptography and Security in Computing (Hardcover)
Jaydip Sen
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R11,899 Discovery Miles 118 990 Ships in 18 - 22 working days
Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover)
Information R Management Association
R11,344 Discovery Miles 113 440 Ships in 18 - 22 working days
Configuring SonicWALL Firewalls (Paperback): Dan Bendell Configuring SonicWALL Firewalls (Paperback)
Dan Bendell
R1,115 Discovery Miles 11 150 Ships in 10 - 15 working days

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years.
This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.
* First book to deliver an in-depth look at the SonicWALL firewall product line
* Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls
* Includes advanced troubleshooting techniques and the SonicWALL Security Manager

Ethical Impact of Technological Advancements and Applications in Society (Hardcover): Rocci Luppicini Ethical Impact of Technological Advancements and Applications in Society (Hardcover)
Rocci Luppicini
R4,943 Discovery Miles 49 430 Ships in 18 - 22 working days

In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R1,106 Discovery Miles 11 060 Ships in 18 - 22 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover): Laurence... IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover)
Laurence Lock Lee
R4,181 Discovery Miles 41 810 Ships in 18 - 22 working days

The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 18 - 22 working days
Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,137 Discovery Miles 11 370 Ships in 18 - 22 working days
Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover):... Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover)
Emmanuel Udoh, Frank Zhigang Wang
R6,632 Discovery Miles 66 320 Ships in 18 - 22 working days

Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.

Software Piracy Exposed (Paperback): Ron Honick Software Piracy Exposed (Paperback)
Ron Honick
R926 Discovery Miles 9 260 Ships in 10 - 15 working days

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software

Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover): Chittaranjan Pradhan, Himansu Das,... Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover)
Chittaranjan Pradhan, Himansu Das, Bighnaraj Naik, Nilanjan Dey
R8,036 Discovery Miles 80 360 Ships in 18 - 22 working days

Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition): Marvin Zelkowitz Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition)
Marvin Zelkowitz
R3,908 Discovery Miles 39 080 Ships in 10 - 15 working days

This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.


Key features:


- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.
- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.

Funny Spam Emails (Paperback): Manley Peterson Funny Spam Emails (Paperback)
Manley Peterson
R295 Discovery Miles 2 950 Ships in 18 - 22 working days
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback): Fred Eady Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback)
Fred Eady
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices.
This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work.
The book thoroughly covers:
* Laptop wireless Ethernet card introduction and theory
*Introduction to CompactFlash-to-microcontroller interfacing
* Implementing the laptop wireless Ethernet card in an embedded environment
In addition, the book includes access to a companion website containing all of the code, schematics and programs necessary to implement embedded 802.11 wireless networking.
* Covers the hottest new embedded market area- wireless networking
* Shows designers how to save money and time by using microcontrollers in their embedded wireless designs instead of expensive, complex prefab boards
* Companion website accompanying book contains all the code, schematics and programs necessary to get started now

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520

 

Partners