0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (362)
  • R250 - R500 (937)
  • R500+ (14,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021): Florian Skopik, Markus... Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021)
Florian Skopik, Markus Wurzenberger, Max Landauer
R3,941 Discovery Miles 39 410 Ships in 12 - 17 working days

This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.

AWS Snowball Developer Guide (Hardcover): Documentation Team AWS Snowball Developer Guide (Hardcover)
Documentation Team
R2,307 R1,781 Discovery Miles 17 810 Save R526 (23%) Ships in 10 - 15 working days
Low-overhead Communications in IoT Networks - Structured Signal Processing Approaches (Hardcover, 1st ed. 2020): Yuanming Shi,... Low-overhead Communications in IoT Networks - Structured Signal Processing Approaches (Hardcover, 1st ed. 2020)
Yuanming Shi, Jialin Dong, Jun Zhang
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The recent developments in wireless communications, networking, and embedded systems have driven various innovative Internet of Things (IoT) applications, e.g., smart cities, mobile healthcare, autonomous driving and drones. A common feature of these applications is the stringent requirements for low-latency communications. Considering the typical small payload size of IoT applications, it is of critical importance to reduce the size of the overhead message, e.g., identification information, pilot symbols for channel estimation, and control data. Such low-overhead communications also help to improve the energy efficiency of IoT devices. Recently, structured signal processing techniques have been introduced and developed to reduce the overheads for key design problems in IoT networks, such as channel estimation, device identification, and message decoding. By utilizing underlying system structures, including sparsity and low rank, these methods can achieve significant performance gains. This book provides an overview of four general structured signal processing models: a sparse linear model, a blind demixing model, a sparse blind demixing model, and a shuffled linear model, and discusses their applications in enabling low-overhead communications in IoT networks. Further, it presents practical algorithms based on both convex and nonconvex optimization approaches, as well as theoretical analyses that use various mathematical tools.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,425 Discovery Miles 24 250 Ships in 12 - 17 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Comparison-shopping Services and Agent Designs (Hardcover): Wang Yun Comparison-shopping Services and Agent Designs (Hardcover)
Wang Yun
R5,144 Discovery Miles 51 440 Ships in 12 - 17 working days

Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.

Managing and Securing a Cisco Structured Wireless-Aware Network (Hardcover): David Wall Managing and Securing a Cisco Structured Wireless-Aware Network (Hardcover)
David Wall
R1,704 Discovery Miles 17 040 Ships in 12 - 17 working days

This book is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, the book also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE).



- Emphasis on AUTOMATING and SIMPLIFYING the management of mixed environment (wired and wireless) networks.
- Describes how to centralized control and configuration of thousands of networking devices
- Security blueprint to help detect rogue access points and achieve fast, secure roaming for mobile applications

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R5,126 Discovery Miles 51 260 Ships in 12 - 17 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Convergence of ICT and Smart Devices for Emerging Applications (Hardcover, 1st ed. 2020): Sara Paiva, Suman Paul Convergence of ICT and Smart Devices for Emerging Applications (Hardcover, 1st ed. 2020)
Sara Paiva, Suman Paul
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book focuses on recent topics related to the convergence of information and communication technologies (ICT) and computing with smart devices. Domain areas of application include social, industrial, business development, and day to day life aspects. This book presents chapters related to the aforementioned topics including case studies showcasing future technological trends and challenges. Topics social inclusion solutions and social changes; smart devices and applications for day to day life; smart IoT and applications; and smart cities solutions. The book is applicable to researchers, students, professionals, and professors in a wide range of fields. Focuses on recent developments in ICT and smart devices that pose a clear benefit for users; Presents applications of ICT in education, health, electronics, communication, networking, computing, tourism, transportation; Appeals to researchers, academics, and professionals in a cross section of disciplines.

Mobile Information Service for Networks (Hardcover, 1st ed. 2020): Changjun Jiang, Zhong Li Mobile Information Service for Networks (Hardcover, 1st ed. 2020)
Changjun Jiang, Zhong Li
R2,807 Discovery Miles 28 070 Ships in 10 - 15 working days

This book introduces readers to mobile information services for networks. The content is divided into eight chapters, each of which presents a specific concept and the latest related developments in mobile information services. Mobile information services for networks can be defined as platform-independent functional entities that provide various services based on the communication network platform. The book discusses the three main supporting technologies for mobile information services: neighbor discovery in the data link layer; routing and balanced association in the network layer; and community structure detection in the application layer. Lastly, the book describes the development of applications based on the authors' mobile information service platform, as well as related key technologies in the domains of intelligent transportation, smart tourism, and mobile payment, such as trajectory analysis, location recommendation, and mobile behavior authentication, which are promoting the development of mobile information services. This book offers a valuable reference guide for researchers in the field of computer science and technology, as well as those in the field of network mobile information service technology.

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R8,760 Discovery Miles 87 600 Ships in 12 - 17 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019): Christoforos Kachris, Babak Falsafi, Dimitrios Soudris Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019)
Christoforos Kachris, Babak Falsafi, Dimitrios Soudris
R3,948 Discovery Miles 39 480 Ships in 12 - 17 working days

This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Full-Duplex Communications for Future Wireless Networks (Hardcover, 1st ed. 2020): Hirley Alves, Taneli Riihonen, Himal A... Full-Duplex Communications for Future Wireless Networks (Hardcover, 1st ed. 2020)
Hirley Alves, Taneli Riihonen, Himal A Suraweera
R2,830 Discovery Miles 28 300 Ships in 10 - 15 working days

This book focuses on the multidisciplinary state-of-the-art of full-duplex wireless communications and applications. Moreover, this book contributes with an overview of the fundamentals of full-duplex communications, and introduces the most recent advances in self-interference cancellation from antenna design to digital domain. Moreover, the reader will discover analytical and empirical models to deal with residual self-interference and to assess its effects in various scenarios and applications. Therefore, this is a highly informative and carefully presented book by the leading scientists in the area, providing a comprehensive overview of full-duplex technology from the perspective of various researchers, and research groups worldwide. This book is designed for researchers and professionals working in wireless communications and engineers willing to understand the challenges and solutions full-duplex communication so to implement a full-duplex system.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,399 Discovery Miles 63 990 Ships in 12 - 17 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019): Shojiro Asai VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019)
Shojiro Asai
R6,339 Discovery Miles 63 390 Ships in 10 - 15 working days

This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.

Amazon Transcribe Developer Guide (Hardcover): Documentation Team Amazon Transcribe Developer Guide (Hardcover)
Documentation Team
R911 Discovery Miles 9 110 Ships in 10 - 15 working days
Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,076 Discovery Miles 10 760 Ships in 12 - 17 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,440 R3,022 Discovery Miles 30 220 Save R418 (12%) Ships in 10 - 15 working days
Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up... Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up Multiple Streams of Passive Income Using Affiliate Marketing and More (Hardcover)
Matthew Shields
R744 R625 Discovery Miles 6 250 Save R119 (16%) Ships in 10 - 15 working days
Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and... Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and Migration - With a Foreword by Lourdes Arizpe Schlosser and a Preface by Hans Gunter Brauch (Hardcover, 1st ed. 2020)
Ursula Oswald Spring
R3,993 Discovery Miles 39 930 Ships in 12 - 17 working days

Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most. Deep-rooted gender discrimination is also a result of the destructive exploitation of natural resources and the pollution of soils, water, biota and air. In the Anthropocene, the management of human society and global resources has become unsustainable and has created multiple conflicts by increasing survival threats primarily for poor people in the Global South. Alternative approaches to peace and security, focusing from bottom-up on an engendered peace with sustainability, may help society and the environment to be managed in the highly fragile natural conditions of a 'hothouse Earth'. Thus, the book explores systemic alternatives based on indigenous wisdom, gift economy and the economy of solidarity, in which an alternative cosmovision fosters mutual care between humankind and nature. * Special analysis of risks to the survival of humankind in the 21st century. * Interdisciplinary studies on peace, security, gender and environment related to global environmental and climate change. * Critical reflections on gender relations, peace, security, migration and the environment * Systematic analysis of food, water, health, energy security and its nexus. * Alternative proposals from the Global South with indigenous wisdom for saving Mother Earth.

Network Flows - Pearson New International Edition (Paperback, Pearson New International Edition): Ravindra Ahuja, Thomas... Network Flows - Pearson New International Edition (Paperback, Pearson New International Edition)
Ravindra Ahuja, Thomas Magnanti, James Orlin
R2,374 Discovery Miles 23 740 Ships in 12 - 17 working days

A comprehensive introduction to network flows that brings together the classic and the contemporary aspects of the field, and provides an integrative view of theory, algorithms, and applications.

Augmented Reality and Virtual Reality - Changing Realities in a Dynamic World (Hardcover, 1st ed. 2020): Timothy Jung, M.... Augmented Reality and Virtual Reality - Changing Realities in a Dynamic World (Hardcover, 1st ed. 2020)
Timothy Jung, M. Claudia Tom Dieck, Philipp A. Rauschnabel
R4,604 Discovery Miles 46 040 Ships in 12 - 17 working days

This book features the latest research in the area of immersive technologies, presented at the 5th International Augmented and Virtual Reality Conference, held in Munich, Germany in 2019. Bridging the gap between academia and industry, it presents the state of the art in augmented reality (AR) and virtual reality (VR) technologies and their applications in various industries such as marketing, education, healthcare, tourism, events, fashion, entertainment, retail and the gaming industry. The volume is a collection of research papers by prominent AR and VR scholars from around the globe. Covering the most significant topics in the field of augmented and virtual reality and providing the latest findings, it is of interest to academics and practitioners alike.

Cybersecurity Measures for E-Government Frameworks (Hardcover): Noor Zaman, Imdad Ali Shah, Samina Rajper Cybersecurity Measures for E-Government Frameworks (Hardcover)
Noor Zaman, Imdad Ali Shah, Samina Rajper
R6,512 Discovery Miles 65 120 Ships in 12 - 17 working days

E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.

The Theory of Queuing Systems with Correlated Flows (Hardcover, 1st ed. 2020): Alexander N. Dudin, Valentina I. Klimenok,... The Theory of Queuing Systems with Correlated Flows (Hardcover, 1st ed. 2020)
Alexander N. Dudin, Valentina I. Klimenok, Vladimir M. Vishnevsky
R2,859 Discovery Miles 28 590 Ships in 10 - 15 working days

This book is dedicated to the systematization and development of models, methods, and algorithms for queuing systems with correlated arrivals. After first setting up the basic tools needed for the study of queuing theory, the authors concentrate on complicated systems: multi-server systems with phase type distribution of service time or single-server queues with arbitrary distribution of service time or semi-Markovian service. They pay special attention to practically important retrial queues, tandem queues, and queues with unreliable servers. Mathematical models of networks and queuing systems are widely used for the study and optimization of various technical, physical, economic, industrial, and administrative systems, and this book will be valuable for researchers, graduate students, and practitioners in these domains.

Starting Digital Signal Processing in Telecommunication Engineering - A Laboratory-based Course (Hardcover, 1st ed. 2021):... Starting Digital Signal Processing in Telecommunication Engineering - A Laboratory-based Course (Hardcover, 1st ed. 2021)
Tomasz P. Zielinski
R2,323 Discovery Miles 23 230 Ships in 12 - 17 working days

This hands-on, laboratory driven textbook helps readers understand principles of digital signal processing (DSP) and basics of software-based digital communication, particularly software-defined networks (SDN) and software-defined radio (SDR). In the book only the most important concepts are presented. Each book chapter is an introduction to computer laboratory and is accompanied by complete laboratory exercises and ready-to-go Matlab programs with figures and comments (available at the book webpage and running also in GNU Octave 5.2 with free software packages), showing all or most details of relevant algorithms. Students are tasked to understand programs, modify them, and apply presented concepts to recorded real RF signal or simulated received signals, with modelled transmission condition and hardware imperfections. Teaching is done by showing examples and their modifications to different real-world telecommunication-like applications. The book consists of three parts: introduction to DSP (spectral analysis and digital filtering), introduction to DSP advanced topics (multi-rate, adaptive, model-based and multimedia - speech, audio, video - signal analysis and processing) and introduction to software-defined modern telecommunication systems (SDR technology, analog and digital modulations, single- and multi-carrier systems, channel estimation and correction as well as synchronization issues). Many real signals are processed in the book, in the first part - mainly speech and audio, while in the second part - mainly RF recordings taken from RTL-SDR USB stick and ADALM-PLUTO module, for example captured IQ data of VOR avionics signal, classical FM radio with RDS, digital DAB/DAB+ radio and 4G-LTE digital telephony. Additionally, modelling and simulation of some transmission scenarios are tested in software in the book, in particular TETRA, ADSL and 5G signals. Provides an introduction to digital signal processing and software-based digital communication; Presents a transition from digital signal processing to software-defined telecommunication; Features a suite of pedagogical materials including a laboratory test-bed and computer exercises/experiments .

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,838 Discovery Miles 48 380
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,631 Discovery Miles 56 310
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900

 

Partners