0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,566)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Emerging Automation Techniques for the Future Internet (Hardcover): Mohamed Boucadair, Christian Jacquenet Emerging Automation Techniques for the Future Internet (Hardcover)
Mohamed Boucadair, Christian Jacquenet
R4,904 Discovery Miles 49 040 Ships in 18 - 22 working days

Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet is a collection of innovative research on the methods and applications of new architectures for the planning, dynamic delivery, and operation of services with a particular focus on automated detection and mitigation of denial-of-service (DoS) attacks. While highlighting topics including policy enforcement, self-architectures, and automated networks, this book is ideally designed for engineers, IT consultants, professionals, researchers, academicians, and students seeking current research on techniques and structures used to enhance experience and services rendered.

Securing E-Business Systems - A Guide for Managers & Executives (Hardcover): T Braithwaite Securing E-Business Systems - A Guide for Managers & Executives (Hardcover)
T Braithwaite
R1,011 R864 Discovery Miles 8 640 Save R147 (15%) Ships in 18 - 22 working days

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation’s enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy." –John R. Thomas, Colonel, U.S. Army, Retired, Former Commander of the DoD, Global Operations and Security Center

Today’s e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts to meet a company’s changing security needs.

Topics include:

  • Security weaknesses
  • Safeguarding technologies
  • Countermeasure best practices
  • Establishing an adaptable e-business security management program
  • Essential elements of a corporate security management program
  • Functions, structure, staffing, and contracting considerations in security management
  • Implementing intrusion detection technology
  • Designing tomorrow’s e-business application for secured operations
  • Contemporary rationales for justifying increased spending on security programs
  • Emerging liability issues for e-businesses
Amazon Simple Storage Service Console User Guide (Hardcover): Documentation Team Amazon Simple Storage Service Console User Guide (Hardcover)
Documentation Team
R1,159 Discovery Miles 11 590 Ships in 18 - 22 working days
Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R3,771 Discovery Miles 37 710 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover): Victor Lobo, Anacleto Correia Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover)
Victor Lobo, Anacleto Correia
R6,167 Discovery Miles 61 670 Ships in 18 - 22 working days

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,167 Discovery Miles 71 670 Ships in 18 - 22 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,169 R2,871 Discovery Miles 28 710 Save R298 (9%) Ships in 18 - 22 working days
Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,177 Discovery Miles 41 770 Ships in 18 - 22 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

Resilient Space Systems Design - An Introduction (Hardcover): Ron Burch Resilient Space Systems Design - An Introduction (Hardcover)
Ron Burch
R3,643 Discovery Miles 36 430 Ships in 10 - 15 working days

Recognized as a "Recommended" title by Choice for their November 2020 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Presenting a fundamental definition of resilience, the book examines the concept of resilience as it relates to space system design. The book establishes the required definitions, relates its place to existing state-of-the-art systems engineering practices, and explains the process and mathematical tools used to achieve a resilient design. It discusses a variety of potential threats and their impact upon a space system. By providing multiple, real-world examples to illustrate the application of the design methodology, the book covers the necessary techniques and tools, while guiding the reader through the entirety of the process. The book begins with space systems basics to ensure the reader is versed in the functions and components of the system prior to diving into the details of resilience. However, the text does not assume that the reader has an extensive background in the subject matter of resilience. This book is aimed at engineers and architects in the areas of aerospace, space systems, and space communications.

Developing Interoperable and Federated Cloud Architecture (Hardcover): Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth Developing Interoperable and Federated Cloud Architecture (Hardcover)
Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R11,906 Discovery Miles 119 060 Ships in 18 - 22 working days
From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R3,801 Discovery Miles 38 010 Ships in 18 - 22 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Edge Computing - Models, Technologies and Applications (Hardcover): Javid Taheri, Shuiguang Deng Edge Computing - Models, Technologies and Applications (Hardcover)
Javid Taheri, Shuiguang Deng
R3,687 R3,326 Discovery Miles 33 260 Save R361 (10%) Ships in 18 - 22 working days
Twitter (Hardcover, 2nd Edition): D. Murthy Twitter (Hardcover, 2nd Edition)
D. Murthy
R1,818 Discovery Miles 18 180 Ships in 18 - 22 working days

Twitter is a household name, discussed for its role in national elections, natural disasters, and political movements, as well as for what some malign as narcissistic chatter. The first edition of Murthy s balanced and incisive book pioneered the study of this medium as a serious platform worthy of scholarly attention. Much has changed since Twitter s infancy, although it is more relevant than ever to our social, political, and economic lives. This timely second edition shows how Twitter has evolved and how it is used today. Murthy introduces some of the historical context that gave birth to the platform, while providing up-to-date examples such as the #blacklivesmatter movement, and Donald Trump s use of Twitter in the US election. The chapters on journalism and social movements have been thoroughly updated, and completely new to this edition is a chapter on celebrities and brands. Seeking to answer challenging questions around the popular medium, the second edition of Twitter is essential reading for students and scholars of digital media.

Big Data Science & Analytics - A Hands-On Approach (Hardcover): Arshdeep Bahga, Vijay Madisetti Big Data Science & Analytics - A Hands-On Approach (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days
Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019): Christoforos Kachris, Babak Falsafi, Dimitrios Soudris Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019)
Christoforos Kachris, Babak Falsafi, Dimitrios Soudris
R3,812 Discovery Miles 38 120 Ships in 18 - 22 working days

This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.

Information Security: Principles and Practices (Hardcover): Miles Carr Information Security: Principles and Practices (Hardcover)
Miles Carr
R2,864 R2,604 Discovery Miles 26 040 Save R260 (9%) Ships in 18 - 22 working days
Blockchain Technology: Platforms, Tools and Use Cases, Volume 111 (Hardcover): Pethuru Raj, Ganesh Chandra Deka Blockchain Technology: Platforms, Tools and Use Cases, Volume 111 (Hardcover)
Pethuru Raj, Ganesh Chandra Deka
R4,211 Discovery Miles 42 110 Ships in 10 - 15 working days

Blockchain Technology: Platforms, Tools and Use Cases, Volume 111, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. This volume has 8 Chapters that discuss the various aspects of Blockchain technology.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,728 Discovery Miles 27 280 Ships in 18 - 22 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Research and Applications in Global Supercomputing (Hardcover): Richard S Segall, Jeffrey S Cook, Qingyu Zhang Research and Applications in Global Supercomputing (Hardcover)
Richard S Segall, Jeffrey S Cook, Qingyu Zhang
R6,791 Discovery Miles 67 910 Ships in 18 - 22 working days

Rapidly generating and processing large amounts of data, supercomputers are currently at the leading edge of computing technologies. Supercomputers are employed in many different fields, establishing them as an integral part of the computational sciences Research and Applications in Global Supercomputing investigates current and emerging research in the field, as well as the application of this technology to a variety of areas. Highlighting a broad range of concepts, this publication is a comprehensive reference source for professionals, researchers, students, and practitioners interested in the various topics pertaining to supercomputing and how this technology can be applied to solve problems in a multitude of disciplines.

Information Security in Diverse Computing Environments (Hardcover): Anne V. D. M. Kayem, Christoph Meinel Information Security in Diverse Computing Environments (Hardcover)
Anne V. D. M. Kayem, Christoph Meinel
R6,147 Discovery Miles 61 470 Ships in 18 - 22 working days

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Cable Networks, Services, and Management (Hardcover): M Toy Cable Networks, Services, and Management (Hardcover)
M Toy
R3,354 Discovery Miles 33 540 Ships in 18 - 22 working days

This is the first book describing cable networks, services, and their management in greater detail by thirteen experts in various fields covering network architectures and services, operations, administration, maintenance, provisioning, troubleshooting (OAMPT) for residential services; network architectures, services, and OAMPT for business services; Software Defined Networks (SDN) and Virtualization concepts Comprehensive reference book useful for people working for a multiple systems operator Includes chapter introductions Written by 13 experts in various fields such as network services and soft defined networks

Fourth-Generation Wireless Networks - Applications and Innovations (Hardcover, New): Fourth-Generation Wireless Networks - Applications and Innovations (Hardcover, New)
R4,781 Discovery Miles 47 810 Ships in 18 - 22 working days

Fourth generation wireless networks are expected to provide comprehensive and secure IP-based solutions, facilitating existing and emerging services such as voice, data, streamed multimedia, sensory, e-health, and social networking. It is expected that 4G will be provided to users on an "Anytime, Anywhere" basis and at much higher data rates compared to the current and previous mobile generations. Fourth-Generation Wireless Networks: Applications and Innovations presents a vision for the coming years in terms of emerging fourth generation (4G) wireless technology trends and best practices. It explores the resulting challenges and technical opportunities that will arise in creating and delivering 4G networks for the emerging applications and services. This book also examines the fundamentals of advanced physical layer and radio resource management as the basis for cross layer and cross network optimization that will emerge for increased mobility and services in video, cloud computing virtualization, entertainment, education, health, and security. This book have been organized especially for researchers, students, network engineers and designers and leaders of emerging companies, decision makers in standards, consumers, and product developers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Verification and Validation of Complex…
John A. Wise, V.David Hopkin, … Hardcover R8,028 Discovery Miles 80 280
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R199 Discovery Miles 1 990
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter Paperback R1,382 R1,304 Discovery Miles 13 040
Contemporary Issues in End User…
Hardcover R2,499 Discovery Miles 24 990
Everything in its Right Place…
Brad Osborn Hardcover R3,567 Discovery Miles 35 670
Tonality and Transformation
Steven Rings Hardcover R1,497 Discovery Miles 14 970
Gender and Rock
Mary Celeste Kearney Hardcover R3,312 Discovery Miles 33 120
Draw a Straight Line and Follow It - The…
Jeremy Grimshaw Hardcover R1,153 Discovery Miles 11 530
Engineering Service Oriented Systems - A…
Bill Karakostas, Yannis Zorgios Hardcover R2,646 Discovery Miles 26 460
Drawing
Michael Craig-Martin Hardcover R1,028 Discovery Miles 10 280

 

Partners