0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (322)
  • R250 - R500 (930)
  • R500+ (16,445)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,499 Discovery Miles 54 990 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Strategic IT Governance 2.0 - How CIOs Succeed at Digital Innovation (Paperback): Philip Weinzimer Strategic IT Governance 2.0 - How CIOs Succeed at Digital Innovation (Paperback)
Philip Weinzimer
R1,396 Discovery Miles 13 960 Ships in 12 - 17 working days

Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies

Cyberpredators and Their Prey (Hardcover): Lauren R Shapiro Cyberpredators and Their Prey (Hardcover)
Lauren R Shapiro
R3,269 Discovery Miles 32 690 Ships in 12 - 17 working days

Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

CompTIA Network+ Study Guide: Exam N10-008 5e (Paperback, 5th Edition): T Lammle CompTIA Network+ Study Guide: Exam N10-008 5e (Paperback, 5th Edition)
T Lammle
R1,113 Discovery Miles 11 130 Ships in 12 - 17 working days

Prepare for the Network+ certification and a new career in network installation and administration In the newly revised Fifth Edition of CompTIA Network+ Study Guide Exam N10-008, bestselling author and network expert Todd Lammle delivers thorough coverage of how to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. This book will prepare you to succeed on the sought-after CompTIA Network+ certification exam, impress interviewers in the network industry, and excel in your first role as a junior network administrator, support technician, or related position. The accomplished author draws on his 30 years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam N10-008: Networking fundamentals, implementations, operations, security, and troubleshooting. You'll also get: Complete, domain-specific coverage of the updated Network+ Exam N10-008 Preparation to obtain a leading network certification enjoyed by over 350,000 networking professionals Access to a superior set of online study tools, including practice exams, flashcards, and glossary of key terms. Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam N10-008, the Fifth Edition of CompTIA Network+ Study Guide Exam N10-008 is a must-have resource for network administrators seeking to enhance their skillset with foundational skills endorsed by industry and thought leaders from around the world.

The Diffusion of Information and Communication Technologies (Paperback): Ewa Lechman The Diffusion of Information and Communication Technologies (Paperback)
Ewa Lechman
R1,240 Discovery Miles 12 400 Ships in 9 - 15 working days

In recent decades, the world has witnessed, unprecedented in terms of speed and geographic coverage, diffusion of new information and communication technologies (ICT). The on-going digital revolution pervasively impacts and reshapes societies and economies and therefore deserves special attention and interest. This book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the 'critical mass' and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis of country-specific data demonstrates the key economic, social and institutional prerequisites of ICT diffusion across examined countries, indicating what factors significantly foster or - reversely - hinder the process.

Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback): John R Vacca Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback)
John R Vacca
R1,445 Discovery Miles 14 450 Ships in 9 - 15 working days

The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.

Computational Social Science - Proceedings of the 1st International Conference on New Computational Social Science (ICNCSS... Computational Social Science - Proceedings of the 1st International Conference on New Computational Social Science (ICNCSS 2020), September 25-27, 2020, Guangzhou, China (Paperback)
Wei Luo, Maria CIUREA, Santosh Kumar
R1,589 Discovery Miles 15 890 Ships in 12 - 17 working days

Selected papers from the International Conference on New Computational Social Science, focusing on the following five aspects: Big data acquisition and analysis, Integration of qualitative research and quantitative research, Sociological Internet experiment research, Application of ABM simulation method in Sociology Research, Research and development of new social computing tools. With the rapid development of information technology, especially sweeping progress in the Internet of things, cloud computing, social networks, social media and big data, social computing, as a data-intensive science, is an emerging field that leverages the capacity to collect and analyze data with an unprecedented breadth, depth and scale. It represents a new computing paradigm and an interdisciplinary field of research and application. A broad comprehension of major topics involved in social computing is important for both scholars and practitioners. This proceedings presents and discusses key concepts and analyzes the state-of-the-art of the field. The conference not only gave insights on social computing, but also affords conduit for future research in the field. Social computing has two distinct trends: One is on the social science issues, such as computational social science, computational sociology, social network analysis, etc; The other is on the use of computational techniques. Finally some new challenges ahead are summarized, including interdisciplinary cooperation and training, big data sharing for scientific data mashups, and privacy protect.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,138 Discovery Miles 11 380 Ships in 12 - 17 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

Vehicular Ad Hoc Networks - Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization (Hardcover):... Vehicular Ad Hoc Networks - Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization (Hardcover)
Muhammad Arif, Guojun Wang, Mazin Abed Mohammed, Md Tabrez Nafis
R3,257 Discovery Miles 32 570 Ships in 12 - 17 working days

With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,809 Discovery Miles 18 090 Ships in 12 - 17 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Fog Computing - Concepts, Frameworks, and Applications (Hardcover): Ravi Tomar, Avita Katal, Susheela Dahiya, Niharika Singh,... Fog Computing - Concepts, Frameworks, and Applications (Hardcover)
Ravi Tomar, Avita Katal, Susheela Dahiya, Niharika Singh, Tanupriya Choudhury
R4,442 Discovery Miles 44 420 Ships in 12 - 17 working days

Fog Computing: Concepts, Frameworks, and Applications is arranged in such a way that readers with no prior experience in Fog Computing may explore this domain. It is an accessible source of information for distributed computing researchers as well as professionals looking to improve their security and connectivity understanding in Internet of Things (IoT) devices. This book is also useful for researchers and professionals working in the field of wireless communication security and privacy research. This book is intended for students, professionals, researchers, and developers who are working in or interested in the field of Fog Computing. One of the book's distinguishing aspects is that it covers a variety of case studies and future possibilities in the field of Fog Computing. This book: Begins by covering the fundamental notions of Fog Computing to help readers grasp the technology, starting from the basics Explains Fog Computing architecture as well as the convergence of Fog, IoT, and Cloud Computing Provides an assessment of Fog Computing and its applications in the field of IoT Discusses the usage of software defined networking and machine learning algorithms as they apply to Fog Computing Describes the different security and privacy issues with Fog Computing and explores single point control systems for consumer devices using Edge-Fog Computing Outlines in detail how to leverage Blockchain technology in Fog Computing, as well as how to use Fog Computing in telemedicine and healthcare applications Examines the usage of communication protocols, simulation tools for Fog Computing implementation, and case studies in the fields of bioinformatics, disaster control, and IoT

Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Paperback): Pethuru Raj, Anupama C. Raman,... Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Paperback)
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
R2,307 Discovery Miles 23 070 Ships in 9 - 15 working days

The Internet of Things (IoT) concept is defined as a flexible and futuristic network where all the different types of devices and smart objects can become seamlessly connected to each other and can actively participate in all types of processes which are happening around us. The grand objective of making physical, mechanical, electrical, and electronic devices to use the deeper and extreme connectivity and service-enablement techniques is to make them intelligent in their deeds, decisions, and deals. Cognitive IoT is the application of cognitive computing technologies to the data which is generated by the connected devices of the IoT ecosystem. Cognition means thinking; however, computers are not yet fully capable of mimicking human like thought. However, the present-day computer systems can perform some functions which are like the capability of human beings to think. Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases explains the concepts surrounding Cognitive IoT. It also looks at the use cases and such supporting technologies as artificial intelligence and machine learning that act as key enablers of Cognitive IoT ecosystem. Different Cognitive IoT enabled platforms like IBM Watson and other product specific use cases like Amazon Alexa are covered in depth. Other highlights of the book include: Demystifying the cognitive computing paradigm Delineating the key capabilities of cognitive cloud environments Deep learning algorithms for cognitive IoT solutions Natural language processing (NLP) methods for cognitive IoT systems Designing a secure infrastructure for cognitive IoT platforms and applications

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,449 Discovery Miles 14 490 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Paperback)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R1,396 Discovery Miles 13 960 Ships in 12 - 17 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Spatial Grasp as a Model for Space-based Control and Management Systems (Hardcover): Peter Simon Sapaty Spatial Grasp as a Model for Space-based Control and Management Systems (Hardcover)
Peter Simon Sapaty
R3,243 Discovery Miles 32 430 Ships in 12 - 17 working days

- Detailed examples of new technology and its important applications for global security and defence, sufficient guidelines for immediate implementations. - Aimed at system theorists, distributed algorithms designers, NASA, DARPA, and SDA network managers, defence and security personnel, university students interested in advanced MSc and PhD projects, and many others. - The book offers a concrete and very practical management solution for many problems described in other books in this area, which were presented mostly on general descriptive and qualitative levels

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R4,004 Discovery Miles 40 040 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Strategic Cyber Security Management (Hardcover): Peter Trim, Yang-Im Lee Strategic Cyber Security Management (Hardcover)
Peter Trim, Yang-Im Lee
R4,748 Discovery Miles 47 480 Ships in 12 - 17 working days

This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to: * evaluate different types of cyber risk * carry out a threat analysis and place cyber threats in order of severity * formulate appropriate cyber security management policy * establish an organization-specific intelligence framework and security culture * devise and implement a cyber security awareness programme * integrate cyber security within an organization's operating system Learning objectives, chapter summaries and further reading in each chapter provide structure and routes to further in-depth research. Firm theoretical grounding is coupled with short problem-based case studies reflecting a range of organizations and perspectives, illustrating how the theory translates to practice, with each case study followed by a set of questions to encourage understanding and analysis. Non-technical and comprehensive, this textbook shows final year undergraduate students and postgraduate students of Cyber Security Management, as well as reflective practitioners, how to adopt a pro-active approach to the management of cyber security. Online resources include PowerPoint slides, an instructor's manual and a test bank of questions.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,235 Discovery Miles 32 350 Ships in 12 - 17 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,593 Discovery Miles 45 930 Ships in 12 - 17 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Network Design for IP Convergence (Paperback): Yezid Donoso Network Design for IP Convergence (Paperback)
Yezid Donoso
R1,777 Discovery Miles 17 770 Ships in 9 - 15 working days

The emergence of quality-of-service (QoS) mechanisms continues to propel the development of real-time multimedia services such as VoIP and videoconferencing. However, many challenges remain in achieving optimized standardization convergence. Network Design for IP Convergence is a comprehensive, global guide to recent advances in IP network implementation. Providing an introduction to basic LAN/WAN/MAN network design, the author covers the latest equipment and architecture, addressing, QoS policies, and integration of services, among other topics. The book explains how to integrate the different layers of reference models and various technological platforms to mirror the harmonization that occurs in the real world of carrier networks. It furnishes appropriate designs for traditional and critical services in the LAN and carrier networks (both MAN and WAN), and it clarifies how a specific layer or technology can cause those services to malfunction. This book lays a foundation for understanding with concepts and applicability of QoS parameters under the multilayer scheme, and a solid explanation of service infrastructure. It goes on to describe integration in both real time and "not real time," elaborating on how both processes can co-exist within the same IP network and concluding with the designs and configurations of service connections. Learn How to Overcome Obstacles to Improve Technology This sweeping analysis of the implementation of IP convergence and QoS mechanisms helps designers and operators get past key obstacles, such as integrating platform layers and technologies and implementing various associated QoS concepts, to improve technology and standards.

Value-Added Services for Next Generation Networks (Paperback): Thierry Van De Velde Value-Added Services for Next Generation Networks (Paperback)
Thierry Van De Velde
R1,758 Discovery Miles 17 580 Ships in 9 - 15 working days

In the NGN world, no truer words are spoken than "the future is now." And the competition in the information networking arena will only intensify in the next 5-10 years. Choosing the correct NGN-VAS strategy now will set your company apart. Value Added Services for Next Generation Networks examines the quest for the real added value in modern communication systems. The author covers more than just the technology itself, but also examines how it is being used and how it could be used to gain a strategic advantage. The book starts with a SOTW analysis for PSTN/GSM operators and new entrants and the threats they will undoubtedly face. The author examines the fundamentals of genuine communication services and the service providers' starting position, then takes you on a tour through the landscape of NGN standards, contrasting the 3GPP IMS architecture with that of IETF, UMA, and OMA. He discusses practical ways to build an NGN SDP and the essential business aspects involved in this enterprise. The book highlights how, technically, the NGN can be interconnected, or glued, to the existing GSM/PSTN infrastructure, justifying the choice of protocols and network architecture. It also describes general concepts, architectural requirements, and technologies in modern VAS platform and new VAS for the NGN in terms of network implementation, end user experience, business scope, and cost/revenue projections. But is NGN just a game of investments in equipment, of CAPEX and OPEX savings? Is the so-called triple play just a matter of marketing, partnerships, and mergers? How will the market play out? Where will the NGN and VAS ultimately go? And more importantly, what is your NGN-VAS strategy? By addressing these questions and more, this book prepares you for success in the emerging telecommunications environment.

Evidence-Based Cybersecurity - Foundations, Research, and Practice (Hardcover): Pierre-Luc Pomerleau, David Maimon Evidence-Based Cybersecurity - Foundations, Research, and Practice (Hardcover)
Pierre-Luc Pomerleau, David Maimon
R1,985 Discovery Miles 19 850 Ships in 12 - 17 working days

Unique selling point: * Focuses on cybersecurity tools and policies based on scientific research findings Core audience: * Cybersecurity practitioners, C-Suite executives, law enforcement professionals, business and finance professionals, academia Place in the market: * No other book has focused on the evidence-based approach for cybersecurity

Frontiers in Magnetic Materials - From Principles to Material Design and Practical Applications (Hardcover): Chen Wu, Jiaying... Frontiers in Magnetic Materials - From Principles to Material Design and Practical Applications (Hardcover)
Chen Wu, Jiaying Jin
R4,153 Discovery Miles 41 530 Ships in 12 - 17 working days

This book provides (i) entry-level knowledge on magnetism, (ii) production and application of prevalent magnetic materials, (iii) recent advances in emerging magnetic materials, (iv) connection between fundamental magnetism and materials design, (v) inspiration for application of magnetism and magnetic materials in multiple areas.

Organisation Management in the Digital Economy - Globalization Challenges (Hardcover): Anna Brzozowska, Dagmara Bubel, Larysa... Organisation Management in the Digital Economy - Globalization Challenges (Hardcover)
Anna Brzozowska, Dagmara Bubel, Larysa Nekrasenko
R3,249 Discovery Miles 32 490 Ships in 12 - 17 working days

This book highlights the essence of information technology in the modern digital world in relation to improvements and threats to organisations and e-business in the era of the digital economy. Rapid IT development has created modern business proposals such as digital and virtual currencies, crowdfunding, peer-to-peer lending, mobile banking, online investing and new payment systems. This allows organisations and firms to increase competitiveness by using financial products and services, thus increasing their value. Information technology users receive significant timesaving and a choice of investment options. At the same time, there is a new challenge for regulators who must monitor how this or that technology affects the financial sector. The authors have collected and systematised information on the models of using information technology in e-business as well as issues of applying information technology in smart organisations and public institutions. The book addresses the issues of risk management in organizations and the problems of personal and social risks resulting from the use of information technology. In addition, the book presents a review of e-commerce sectors and models as well as e-commerce tools, international payment systems and modern money systems. Risks, threats and security rules for using banking services, e-commerce and payment systems are reviewed and systematised.

Digital Transformation in Cloud Computing - Top-level Design, Architecture, and Applications (Hardcover): Alibaba Cloud... Digital Transformation in Cloud Computing - Top-level Design, Architecture, and Applications (Hardcover)
Alibaba Cloud Intelligence GTS; Contributions by Zhang Zhou
R4,679 Discovery Miles 46 790 Ships in 12 - 17 working days

With the rapid development of cloud computing and digital transformation, well-designed cloud-based architecture is always in urgent need. Illustrated by project cases from the Chinese technology company Alibaba, this book elaborates how to design a cloud-based application system and build them on the cloud. Cloud computing is far from being just a resource provider; it offers database, storage and container services that can help to leverage key advantages for business growth. Based on this notion, authors from the Alibaba Cloud Global Technology Services introduce new concepts and cutting-edge technology in the field, including cloud-native, high-availability and disaster tolerance design on cloud, business middle office, data middle office, and enterprise digital transformation. Resting upon Alibaba's years of practice and achievements in the field of cloud technology, the volume also elucidates the methodology and practice solutions of digital construction, including methodology, product tools, technical processes, architecture design, cloud application capacity assessment and optimization, etc. The book will appeal to researchers, students, and especially IT practitioners, professionals, and managers interested in cloud computing, digital transformation, cloud migration, business middle office, data middle office, as well as the Alibaba Cloud itself.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Transforming Your Business with AWS…
P Abdoulaye Paperback R729 Discovery Miles 7 290
Kali Linux Penetration Testing Bible
G Khawaja Paperback R749 Discovery Miles 7 490
Wireless Security Architecture…
J Minella Paperback R913 Discovery Miles 9 130
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,331 R1,194 Discovery Miles 11 940
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,364 R1,222 Discovery Miles 12 220
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,401 Discovery Miles 14 010

 

Partners