0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (256)
  • R250 - R500 (863)
  • R500+ (13,660)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition): Marvin Zelkowitz Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition)
Marvin Zelkowitz
R3,908 Discovery Miles 39 080 Ships in 10 - 15 working days

This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.


Key features:


- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.
- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.

Funny Spam Emails (Paperback): Manley Peterson Funny Spam Emails (Paperback)
Manley Peterson
R295 Discovery Miles 2 950 Ships in 18 - 22 working days
Research Anthology on Securing Medical Systems and Records, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 1 (Hardcover)
Information R Management Association
R11,321 Discovery Miles 113 210 Ships in 18 - 22 working days
Network Security Attacks and Countermeasures (Hardcover): Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi Network Security Attacks and Countermeasures (Hardcover)
Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback): Fred Eady Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback)
Fred Eady
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices.
This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work.
The book thoroughly covers:
* Laptop wireless Ethernet card introduction and theory
*Introduction to CompactFlash-to-microcontroller interfacing
* Implementing the laptop wireless Ethernet card in an embedded environment
In addition, the book includes access to a companion website containing all of the code, schematics and programs necessary to implement embedded 802.11 wireless networking.
* Covers the hottest new embedded market area- wireless networking
* Shows designers how to save money and time by using microcontrollers in their embedded wireless designs instead of expensive, complex prefab boards
* Companion website accompanying book contains all the code, schematics and programs necessary to get started now

Multimedia Transcoding in Mobile and Wireless Networks (Hardcover): Ashraf M. a. Ahmad, Ismail Khalil Ibrahim Multimedia Transcoding in Mobile and Wireless Networks (Hardcover)
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim
R4,984 Discovery Miles 49 840 Ships in 18 - 22 working days

In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.

IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover): Laurence... IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover)
Laurence Lock Lee
R4,181 Discovery Miles 41 810 Ships in 18 - 22 working days

The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.

Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover): Jianwen "Wendy" Chen, Yan Zhang, Ron... Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover)
Jianwen "Wendy" Chen, Yan Zhang, Ron Gottschalk
R8,120 Discovery Miles 81 200 Ships in 18 - 22 working days

Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.

Development of Distributed Systems from Design to Application and Maintenance (Hardcover): Nik Bessis Development of Distributed Systems from Design to Application and Maintenance (Hardcover)
Nik Bessis
R4,955 Discovery Miles 49 550 Ships in 18 - 22 working days

With the continued research of distributed systems and technologies, the ability to have mixed technologies work together is crucial for the development of many types of society systems. Development of Distributed Systems from Design to Application and Maintenance is a collection of research on the strategies used in the design and development of distributed systems applications. Including research from traditional and emerging areas of applied distributed systems, this book covers theories, practices, and encourages future development for researchers, practitioners, and industry professionals as well as academicians.

Firewalls - Jumpstart for Network and Systems Administrators (Paperback): John R Vacca, Scott Ellis Firewalls - Jumpstart for Network and Systems Administrators (Paperback)
John R Vacca, Scott Ellis
R2,289 Discovery Miles 22 890 Ships in 10 - 15 working days

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
-Install and configure proxy-based and stateful-filtering firewalls
-Protect internal IP addresses with NAT and deploy a secure DNS architecture
-Develop an Internet/intranet security policy to protect your organization's systems and data
-Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover): Tolga Soyata Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover)
Tolga Soyata
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.

Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback): Jason Deckard Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback)
Jason Deckard
R839 Discovery Miles 8 390 Ships in 10 - 15 working days

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows.
*None of the current-best selling software security books focus exclusively on buffer overflows.
*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover): Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover)
R4,731 Discovery Miles 47 310 Ships in 18 - 22 working days

Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.

Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover): Luisa Dall'acqua, Irene Maria... Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover)
Luisa Dall'acqua, Irene Maria Gironacci
R5,353 Discovery Miles 53 530 Ships in 18 - 22 working days

The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R1,786 Discovery Miles 17 860 Ships in 10 - 15 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,625 Discovery Miles 36 250 Ships in 10 - 15 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Cloud Computing Interview Questions You'll Most Likely Be Asked - Second Edition (Paperback, 2nd ed.): Vibrant Publishers Cloud Computing Interview Questions You'll Most Likely Be Asked - Second Edition (Paperback, 2nd ed.)
Vibrant Publishers
R865 Discovery Miles 8 650 Ships in 18 - 22 working days
Amazon Relational Database Service User Guide (Hardcover): Documentation Team Amazon Relational Database Service User Guide (Hardcover)
Documentation Team
R2,956 Discovery Miles 29 560 Ships in 18 - 22 working days
Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover): Documentation Team AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover)
Documentation Team
R2,376 R1,953 Discovery Miles 19 530 Save R423 (18%) Ships in 18 - 22 working days
Stealing the Network - How to Own a Continent (Loose-leaf): Ryan Russell, Joe Grand, Tom Craig Stealing the Network - How to Own a Continent (Loose-leaf)
Ryan Russell, Joe Grand, Tom Craig
R1,088 R883 Discovery Miles 8 830 Save R205 (19%) Ships in 10 - 15 working days

This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world

Configuring NetScreen Firewalls (Paperback): Rob Cameron Configuring NetScreen Firewalls (Paperback)
Rob Cameron
R831 Discovery Miles 8 310 Ships in 10 - 15 working days

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security Manager. This book offers novice users a complete opportunity to learn the NetScreen firewall appliance. Advanced users will find it a rich technical resource.
* NetScreen is the #2 best-selling firewall appliance in the world (behind only Cisco PIX) and there are no competing books.
* Covers the materials found on the NetScreen NCSA 5.0 exam.
* Syngress firewall books are consistent best-sellers with market-leading books on ISA Server, Cisco PIX, and Check Point Next Generation.

Cloud Computing & Virtualization (Hardcover, St ed.): R Rajeswara Rao, V Subba Ramaiah Cloud Computing & Virtualization (Hardcover, St ed.)
R Rajeswara Rao, V Subba Ramaiah
R1,736 R1,494 Discovery Miles 14 940 Save R242 (14%) Ships in 18 - 22 working days
Internet Security - A Jumpstart for Systems Administrators and IT Managers (Paperback, New): Tim Speed, Juanita Ellis Internet Security - A Jumpstart for Systems Administrators and IT Managers (Paperback, New)
Tim Speed, Juanita Ellis
R2,087 Discovery Miles 20 870 Ships in 10 - 15 working days

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
.Shield data from both the internal and external intruder
.Discover products that can detect and prevent these break-ins
.Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
.Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690

 

Partners